Overview
On Site
$78.57 - $78.57 hr
Contract - Independent
Contract - W2
Contract - 8+ mo(s)
Skills
SQL
SPL
PYTHON
SPLUNK QUERY
SEARCH PROCESSING LANGUAGE
MALWARE
THREAT DETECTION
INCIDENT RESPONSE
CYBER INTELLIGENCE
SECURITY OPERATIONS
SECURITY OPS
DIGITAL FORENSICS
INTELLIGENCE ANALYSIS
OFFENSIVE SECURITY
THREAT DETECTION
APPLICATION SECURITY
THREAT INTELLIGENCE
SECURITY DETECTION
THREAT HUNT
SPLUNK
CROWDSTRIKE
QRADAR
INSIGHT IDR
SUMO LOGIC
LOGRHYTHM
SYMANTEC
FIREEYE
SENTINELONE
TERAMIND
INVESTIGATE
INVESTIGATION
INVESTIGATING
RESEARCH
ASSESS
ANALYZE
INSPECT
ANALYSIS
EXAMINATION
AI/ML
ARTIFICIAL INTELLIGENCE
MACHINE LEARNING
RED TEAM
OFFENSIVE TEAM
DATA SCIENCE
Job Details
Payrate: $78.57 - $78.57/hr.
Summary:
Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, extensive experience providing analysis and trending of security log data from many heterogeneous security devices.
Responsibilities:
Skills:
Qualifications:
Pay Transparency: The typical base pay for this role across the U.S. is: $78.57 - $78.57/hr. Final offer amounts, within the base pay set forth above, are determined by factors including your relevant skills, education and experience and the benefits package you select. Full-time employees are eligible to select from different benefits packages. Packages may include medical, dental, and vision benefits, 10 paid days off, 401(k) plan participation, commuter benefits and life and disability insurance.
For information about our collection, use, and disclosure of applicant's personal information as well as applicants' rights over their personal information, please see our Privacy Policy ( policy).
Aditi Consulting LLC uses AI technology to engage candidates during the sourcing process. AI technology is used to gather data only and does not replace human based decision making in employment decisions. By applying for this position, you agree to Aditi s use of AI technology, including calls from an AI Voice Recruiter.
#AditiConsulting
Summary:
Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, extensive experience providing analysis and trending of security log data from many heterogeneous security devices.
Responsibilities:
- Incident Response, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis
- Investigations - Investigating computer and information security incidents to determine extent of compromise to information and automated information systems
- Escalations - Responding to escalated events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems.
- Research - Researching attempted or successful efforts to compromise systems security and designs countermeasures.
- Education - maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
- Communications - Provides information and updates to shift leads & leadership, creates pass-downs for next shift, work closely with supporting teams, provide feedback for new security policy and standards, engage with other teams and adjacencies through email and conference calls.
- Digital Forensics - As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country law
Skills:
- Offensive Techniques - Penetration testing, IOCs, and exploits at all layers of the stack.
- Logs - you should be comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats.
- System Forensics - Basic understanding of image acquisition techniques, memory forensics, and the like.
- Networking Fundamentals - TCP/IP Protocols (HTTP, DNS, FTP, DHCP, ARP, etc.), and Wireshark/TCPDump.
- Scripting - Should be familiar with scripting in at least one of the following: python, perl or a similar language.
- Risk Analysis - Evaluating a vulnerability in a particular environment and understanding the associated risks to enterprise systems.
Qualifications:
- Bachelor s degree in computer science, Engineering, Information Technology, Cybersecurity, or a related field.
- Minimum three (3) years of professional experience in incident detection and response, malware analysis, or digital forensics.
- Must have at least one (1) of the following certifications:
- SANS GIAC: GCED, GCIA, GPEN, GWAPT, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON, GCIH
- ISC2: CCFP, CCSP, CISSP
- Cisco: CCNA, CCNP
- CERT: CSIH
- EC Council: CEH, ENSA, CNDA, ECSS, ECSP, ECES, CHFI, LPT, ECSA, or ECIH
- Offensive Security: OSCP, OSCE, OSWP and OSEE
- Digital Forensics: EnCE, CB, MiCFE, ACE, GCFA, GCFE
- In addition, a minimum of one (1) year of specialized experience in one or more of the following areas:
- Security Assessment or Offensive Security
- Application Security
- Security Operations Center/Security Incident Response
- Cyber intelligence Analysis
Pay Transparency: The typical base pay for this role across the U.S. is: $78.57 - $78.57/hr. Final offer amounts, within the base pay set forth above, are determined by factors including your relevant skills, education and experience and the benefits package you select. Full-time employees are eligible to select from different benefits packages. Packages may include medical, dental, and vision benefits, 10 paid days off, 401(k) plan participation, commuter benefits and life and disability insurance.
For information about our collection, use, and disclosure of applicant's personal information as well as applicants' rights over their personal information, please see our Privacy Policy ( policy).
Aditi Consulting LLC uses AI technology to engage candidates during the sourcing process. AI technology is used to gather data only and does not replace human based decision making in employment decisions. By applying for this position, you agree to Aditi s use of AI technology, including calls from an AI Voice Recruiter.
#AditiConsulting
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.