Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. |
Years | Required/Preferred | Experience |
8 | Required | Strong understanding of attacker tactics, techniques, and procedures. |
8 | Required | Experience analyzing logs and telemetry from SIEM, EDR/XDR, network security, identity platforms, and cloud environments. |
8 | Required | Proficiency in query languages and scripting used for threat hunting. |
8 | Required | Solid knowledge of Windows, Linux, and cloud operating systems, including common attack vectors and persistence mechanisms. |
8 | Required | Proven expertise in security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks. |
8 | Required | Knowledge and understanding of threat analysis and assessment of potential and current information security risk/threats and designing solutions to mitigate those threats. |
8 | Required | Knowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards. |
8 | Required | Familiarity with threat intelligence sources, malware analysis concepts, and digital forensics fundamentals. |
8 | Required | Experience documenting investigations, creating hunt reports, and communicating technical findings to diverse audiences. |
8 | Required | Strong analytical, problem-solving, and critical-thinking skills. |
8 | Required | Ability to work independently while collaborating effectively within cross-functional cybersecurity teams. |
8 | Required | Ability to resolve complex security issues in diverse and decentralized environments; to learn, communicate, and teach new information and security technologies; and to communicate effectively. |
8 | Required | Conduct forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future. |
8 | Required | Experience creating/reviewing/updating security policies and standards for the public/private/hybrid cloud contexts. |
3 | Preferred | GSEC, CEH, CISA, CCSP |
3 | Preferred | Certification as an AWS Solutions Architect, Cloud Security Certification, and/or OpenStack Administrator Certification a plus. (Other cloud-related certification also a plus.) |
3 | Preferred | Experience with Endpoint Detection and Response (i.e. EndGame, Crowdstrike, CyberReason). Detect and respond to alerts from end point detection response tools. |
3 | Preferred | Experience with Email Threat Management (i.e. Proofpoint, MimeCast, Microsoft). |
3 | Preferred | Experience with SIEM engineering design/management/analysts (i.e. Splunk, Rapid7, SumoLogic). |
3 | Preferred | Experience with Data Loss Protection/Cloud Access Security Brokers (i.e. Symantec, Microsoft, Bitglass, Netskope). |
3 | Preferred | Experience with Cloud Enterprise Network Security (i.e. Cisco Umbrella, Palo Alto, ZScaler). |