Job Expired - Click here to search for similar jobs
Must have experience:
Experience in Highly available 24x7x365 Enterprise Operational Environment
Must have strong critical thinking and analysis skills.
Must be a strong communicator both verbally and through text.
Effectively gather and analyze data for evidence of a loss of Confidentiality, Integrity, and Availability.
Mature understanding of industry accepted standards for incident response actions and best practices related to SOC operations.
In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, and incident management.
Should have experience creating automations for SIEM/SOAR tools and general security operations.
Proven success in working SOC function/team, including (but not limited to):
Experience creating and maintaining metrics, reporting and SLAs
Security operations experience with operating systems, cloud infrastructures and services (Azure/AWS) and customer-facing web applications
Familiarity or experience with Intelligence Driven Defense, Cyber Kill Chain methodology, as well as the NIST and MITRE Telecommunication&CK framework s .
Strong analytical skills and attention to detail with thorough documentation skills.
Experience with enterprise architecture and infrastructure including, but not limited to servers, network appliances, databases, and system administration/management.
Ability to research, analyze, and resolve complex problems with minimal supervision and escalate issues as appropriate
Experience with a SIEM and a SOAR such as Azure Sentinel is required.
Industry-standard certifications such as SANS Certified Incident Handler, Malware Reverse Engineer, Forensic Investigator, Intrusion Analyst, or CISSP are valued.
Date Posted: 01 May 2024
Job Expired - Click here to search for similar jobs