Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
6 years of experience in SOC analyst, malware research, threat hunting, or similar roles, working with EDR and SIEM technologies.
Experience using multiple operating systems, directory service software, and document, spreadsheet, and presentation software.
Experience leading incident response activities.
Preferred qualifications:
Certification in one or more of the following: CompTIA Security+, CompTIA Network+, ISC2 (CISSP), SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT), CISCO (CCNA), EC-Council (CEH, LPT).
Knowledge of scripting languages (i.e., PowerShell and Python).
Understanding of operating systems, including Windows and Linux.
Understanding of security controls for common platforms and devices, including Windows, Linux and network equipment.
Ability to engage and collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.
Excellent written and verbal communication skills.