28 May, 2019
Job ID: 20190528002
Job Role: Cyber Defense Analyst
Experience: 5-7 Years
Vacancies: Not Mentioned
Salary: Not Mentioned
Bachelor’s Degree or higher in the field of Computer Science or Information Security or related field (may be substituted for experience and industry certifications)
• 5-7 of experience in cyber security or related technology field preferred
• 4+ years of experience in incident response, forensics, or related activities.
• Individual technical Cyber Security Certification through one of the recognized bodies preferred: SANS, ISACA, (ICS)2, CompTIA, Cisco, etc.
Experience with offensive operations – system and application penetration techniques
• Understanding of core networking concepts (TCP/IP, etc.) and common protocols (HTTP, FTP, etc.).
• Experience with AntiVirus, Intrusion Detection Systems, Firewalls, Active Directory, Web Proxies, Vulnerability Assessment tools and other security tools found in large enterprise network environments; along with experience working with Security Information and Event Management (SIEM) solutions.
• Familiarity with various network and host based security applications and tools, such as network and host assessment/scanning tools, network and host based intrusion detection systems, and other security software packages.
• Experience with AWS and Azure and strong plus
• Experience with next-gen Endpoint Detection and Response Tools a strong plus
• Intrusion monitoring, attack analysis, and incident response duties as required and directed.
• Utilize attack and malware analysis techniques, advanced statistic and dynamic analysis to identify and assess malicious software and behaviors.
• Perform malware and/or forensic analysis as part of the incident management process.
• Monitor open source feeds and reporting on the latest threats against computer network defenses.
• Provide technical expertise regarding the defense of company information, systems, networks, and applications.
• Initiate computer incident handling procedures to isolate and investigate potential network information system and application compromises.