Overview
Hybrid
Depends on Experience
Contract - W2
Skills
Cyber Security
Event Management
Data Governance
SIEM
Security Architecture
Threat Analysis
Vulnerability Assessment
Root Cause Analysis
Intrusion Detection
IDS
Incident Management
International Relations
Investor Relations
Vulnerability Management
System Monitoring
Optimization
IT Management
Information Retrieval
Information Security
Information Systems
Information Technology
Management
Network Monitoring
Computer Science
Job Details
Job Title: Cybersecurity Specialist 3
Location: Atlanta, GA 30345 (Hybrid)
Duration: 8 months
Entry Qualifications
- Bachelor's degree in Computer Science/Information Technology/Information Security or related field or equivalent experience and four (4) years of proven experience and demonstrated success in technology leadership with emphasis on information security and data governance.
Key Responsibilities:
Advanced Threat Hunting:
- Proactively search for sophisticated, covert threats that evade automated detection.
- Possess a deep understanding of cybersecurity threats, vulnerabilities, security frameworks, and monitoring tools.
Complex Incident Response:
- Investigate, triage, and respond to security incidents, documenting findings for root cause analysis.
Vulnerability Assessment:
- Conduct in-depth vulnerability assessments and analyze asset discovery data to identify security gaps.
Security Architecture:
- Design and implement security solutions, often involving threat intelligence platforms and other advanced security technologies.
System Monitoring & Response:
- Actively monitor networks for unauthorized activities and respond to security incidents.
Tool Optimization:
- Evaluate and optimize existing cybersecurity tools, such as SIEM, EDR, and IDS, and recommend new technologies or processes.
Threat Intelligence Integration:
Integrate various threat intelligence feeds into platforms like MISP to enhance detection capabilities.
Skills and Competencies:
Deep Technical Expertise:
- Mastery of intrusion detection systems (IDS), endpoint detection and response (EDR), and security information and event management (SIEM) platforms.
- High-level proficiency in computer science and information systems, network monitoring, and security software.
Vulnerability Management:
- Experience and skills with vulnerability assessment tools and techniques.
Threat Intelligence:
- The ability to gather, integrate, and analyze threat intelligence from various sources.
Incident Response (IR):
- In-depth knowledge of IR best practices and the ability to manage complex incidents.
Proactive Defense:
- A mindset focused on proactive threat hunting and prevention rather than just reaction.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.