Overview
On Site
Depends on Experience
Contract - Independent
Contract - W2
Contract - 6 Month(s)
Skills
Amazon Web Services
Cloud Computing
Google Cloud Platform
Incident Management
Information Security
Palo Alto
Regulatory Compliance
SIEM
Threat Analysis
CYBER THREAT INTELLIGENCE
CTI
threat intelligence
Tanium
CrowdStrike
GoogleSec Opps
Proofpoint
Palo Alto Demisto
Axonius
ExtraHop
Python
PowerShell
BASH
endpoint telemetry
Cyber Kill Chain
Threat Modeling
Job Details
Top Requirements
(Must haves)
- Bachelor s degree in Computer Science, Information Security, or related field.
- 5+ years of experience in Information Security roles with deep exposure to threat intelligence, incident response, and forensics
- Cool calm, demeanor who is teachable and then can turn around and help others. Someone ordered and methodical.
- Prior experience in red team / offensive security operations or working alongside red team engagements
- Strong knowledge of attack frameworks such as MITRE ATT&CK, Cyber Kill Chain, and Diamond Model
- Hands-on experience with tools such as: Tanium, CrowdStrike, GoogleSec Opps, Proofpoint, Palo Alto Demisto, Axonius, ExtraHop
- Scripting or automation using Python, PowerShell, or Bash
- Solid understanding of network protocols, cloud architectures (AWS/Google Cloud Platform/Azure), and endpoint telemetry.
- Excellent written and verbal communication skills for incident write-ups and executive briefings
- Experience in ecommerce protection/application security & compliance.
Additional Qualifications
- Experience with purple team engagements or SIEM detection engineering
- Familiarity with threat modeling and intel enrichment platforms
- Ability to brief stakeholders, legal, and compliance teams on cyber threat
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.