3 years of experience in Security Analysis, Networking, Windows, TCP/IP, Security and Command-Line Interface.
3 years of experience in security operations or system/network administration, or relevant certifications (e.g., GCIH, GCFA, GREM, CEH, CySA+, CC, etc.).
Experience in Protocols, Log Analysis, Security Monitoring, Cyber Security, Logging and Attacks.
Preferred qualifications:
Certifications in PEN-200/OSCP, GCFA, GREM, or GPEN.
Experience with log management platforms, such as Splunk or Elasticsearch/Logstash/Kibana (ELK).
Experience with cloud infrastructure such as Google Cloud Platform (GCP).
Experience writing either host-based or network-based detections (e.g., Yara or Snort).
Knowledge of common offensive security tools, such as Metasploit, Cobalt Strike, Empire, PowerSploit, or CrackMapExe.
Familiarity with enterprise IT administration tools and the living off the land (LotL) concept.