3 years of experience in SOC analyst, malware research, threat hunting, or similar roles, working with EDR and SIEM technologies.
2 years of experience with networking, including TCP/IP protocols and network topology.
1 year of experience leading incident response activities.
Preferred qualifications:
Certification in one or more of the following: CompTIA Security+, CompTIA Network+, ISC2 (CISSP), SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT), CISCO (CCNA), EC-Council (CEH, LPT).
Knowledge of scripting languages (i.e., PowerShell and Python).
Understanding of operating systems, including Windows and Linux.
Understanding of security controls for common platforms and devices, including Windows, Linux and network equipment.
Ability to simplify and communicate complex ideas.
Excellent written and verbal communication skills.