Bachelor’s degree or equivalent practical experience.
6 years of experience in either system design or in one programming language (e.g., Java, C++, Python, etc.).
6 years of experience in technical troubleshooting, and managing internal/external partners or customers.
Experience working with incident response investigations, analysis, and containment actions.
Experience with network forensics, malware triage analysis, cloud forensics, and disk and memory forensics.
Secret US Government Security clearance.
Preferred qualifications:
SIEM Event Analysis, Triage, and Investigation experience.
Experience with Security Impact Assessment and Formal Reporting.
Experience with Technical Requirements Development of SecStack Tooling (e.g., SPULK, ElasticSearch, Google Secops/Chronicle + SCC, Trellix Endpoint Detection and Response-EDR, IDS/IPS, etc.).
Experience with TIER 1 Analyst Support and Technical Mentorship.
Security Event Management knowledge, leveraging common support systems (e.g. ServiceNow) to document and manage the lifecycle of an incident.