Bachelor’s degree or equivalent practical experience.
6 years of experience in technical troubleshooting, and managing internal/external partners or customers.
6 years of experience in system design or in one programming language (Java, C++, Python, etc.).
Experience with network forensics, malware triage analysis, cloud forensics, and disk and memory forensics.
Experience working with incident response investigations, analysis, and containment actions.
Secret US Government Security clearance.
Preferred qualifications:
Experience in SIEM event analysis, triage, and investigation.
Experience providing technical guidance and support to TIER 1 analysts.
Knowledge of security event management, leveraging common support systems (e.g. ServiceNow) to document and manage the lifecycle of an incident.
Proven ability to conduct comprehensive security impact assessments, identify potential risks, and produce detailed, actionable reports, including understanding of industry standards and regulatory compliance requirements.
Expertise in developing technical requirements for Security tooling, ensuring alignment with security objectives and project goals, and familiarity with agile development methodologies and collaboration tools.
Ability to effectively mentor and train team members.