Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
5 years of experience in SOC analyst, malware research, threat hunting, or similar roles, working with EDR and SIEM technologies.
Experience participating in incident response activities.
Preferred qualifications:
Certification in one or more of the following: CompTIA Security+; CompTIA Network+; ISC2 (CISSP); SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT); CISCO (CCNA); EC-Council (CEH, LPT).
Knowledge of scripting languages (i.e., PowerShell and Python).
Understanding of operating systems.
Understanding of security controls for common platforms and devices.
Ability to engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
Excellent written and verbal communication skills.