The point where experts and best companies meet
Share
Job Description:
Required Skills:
• 5+ years of experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence.
• Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.
• Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue.
• Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways
• Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.
• Ability to navigate and work effectively across a complex, geographically dispersed organization.
Desired Skills:
• Experience with more than one or more enterprise scale EDR and SIEM tool.
• Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.
• Experience with offensive security tools such as Cobalt Strike/Metasploit, techniques such as OSINT, and the methods used to compromise large enterprise networks.
• Previous experience performing digital forensics or indecent response on major security incidents.
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)These jobs might be a good fit