3 years of experience in Security Analysis, Networking, Windows, TCP/IP, Security and Command-Line Interface.
3 years of experience in security operations or system/network administration, or relevant certifications (e.g., GCIH, GCFA, GREM, CEH, CySA+, CC, etc.).
Experience in Protocols, Log Analysis, Security Monitoring, Cyber Security, Logging and Attacks.
Preferred qualifications:
Certifications in PEN-200/OSCP, GCFA, GREM, or GPEN.
Experience with log management platforms, such as Splunk or Elasticsearch/Logstash/Kibana (ELK).
Experience with cloud infrastructure such as Google Cloud Platform (GCP).
Experience writing either host-based or network-based detections (e.g., Yara or Snort).
Knowledge of common offensive security tools, such as: Metasploit, Cobalt Strike, Empire, PowerSploit, or CrackMapExe.
Familiarity with enterprise IT administration tools and the “living off the land” (LotL) concept.