Apply today if your background includes:
- 1+ years of incident analysis, security architecture, malware research, SOC, or any other similar incident response experience preferred OR recent 4 year degree in Cyber Security required
- Fundamental understanding of security tools such as SIEM, IDS/IPS, web proxies, DLP, CASB, SIEM, DNS security, DDoS protection, and firewalls
- Fundamental understanding of cloud security and responding to cloud alerts/events
- Knowledge of NIST and MITRE ATT&CK security frameworks
- Knowledge of Microsoft Windows systems including active directory and Unix systems
- Experience analyzing and inspecting log files, network packets, and any other security tool information output from multiple system types
- Familiar with basic reverse engineering principles and understand of malware, rootkits, TCP/UDP packets, network protocols
- Team-oriented and skilled in working within a collaborative environment
- Ability to effectively multi-task, prioritize and execute tasks in a high-pressure environment
- Required flexibility to work nights, weekends, and/or holiday shifts in the event of an incident response emergency
- Experience with technical analysis of email headers, links, and attachments to determine if an email is malicious, and then executing remediation techniques to protect the environment
- One or more of the following certifications are recommended: CompTIA Security +; CompTIA Network +; Information systems Security Professional (CISSP); SANS-GIAC certification (Security Essentials/GCIH, GCED, GCIA, GNFA); EC-Council (CEH)
- Assisting with the delivery of assigned SOC deliverables and related log collection and analysis tools.
- Supporting the creation, documentation, and implementation of security policies, procedures and practices.
- Conducting proactive research and investigations to identify threats/vulnerabilities and identify remediation/mitigation procedures.
- Collaborating and working closely with other IT teams/users to identify and resolve security-related issues.
- Assisting project teams with performing risk and vulnerability assessments on business processes and infrastructure systems. Working with appropriate parties to develop appropriate resolution and/or mitigation plans.
- Participate in technical meetings and working groups to address issues related to malware, threats, vulnerabilities, and cybersecurity preparedness
- Collaborate with peers and multiple teams to identify improvements and identify areas for tuning use cases or signatures to enhance monitoring value
