Role Responsibilities
Required Qualifications
- 5+ years of experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence.
- Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.
- Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue.
- Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways
- Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.
- Ability to navigate and work effectively across a complex, geographically dispersed organization.
Desired Qualifications
- Experience with more than one or more enterprise scale EDR and SIEM tool.
- Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.
- Experience with offensive security tools such as Cobalt Strike/Metasploit, techniques such as OSINT, and the methods used to compromise large enterprise networks.
- Previous experience performing digital forensics or indecent response on major security incidents.
Skills:
- Critical Thinking
- Customer and Client Focus
- Information Systems Management
- Problem Solving
- Threat Analysis
- Cyber Security
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)