CyberSecurity - Incident Response and Security Operations

Remote • Posted 4 hours ago • Updated 4 hours ago
Contract Independent
Contract W2
Contract Corp To Corp
No Travel Required
Able to Sponsor
Remote
Depends on Experience
Company Branding Image
Fitment

Dice Job Match Score™

🔗 Matching skills to job...

Job Details

Skills

  • Cyber Security
  • CISSP
  • Windows PowerShell
  • WAF
  • Vulnerability Management
  • TCP/IP
  • Unix
  • System On A Chip
  • Server Message Block
  • Security Operations
  • Security Awareness
  • Secure Shell
  • Scripting Language
  • SMB
  • SIEM
  • SFTP
  • Regulatory Compliance
  • Network Protocols
  • Operating Systems
  • OS X
  • Python
  • RDP
  • Regular Expression
  • Microsoft Azure
  • Microsoft Windows
  • NFS
  • HIDS
  • GCIH
  • GCFA

Summary

A seasoned Cyber Security professional with a strong background in incident response and security operations. You thrive in dynamic environments and are passionate about safeguarding organizational assets from evolving cyber threats. With over 5 years of experience in a Security Operations Center (SOC) or Incident Response role, you possess a deep understanding of various security frameworks and are adept at correlating and analyzing data from multiple log sources. Your technical expertise spans across network protocols, data protection, and cloud environments, making you a versatile and invaluable asset to any security team. You are a proactive communicator, capable of articulating complex security issues to diverse audiences, and you are committed to continuous learning and improvement in the ever-evolving field of cybersecurity.

What You ll Be Doing:

* Leading investigations and serving as a subject matter expert while correlating data across multiple log sources and systems.
* Continually improving cyber security procedures and documentation to enhance the security posture of the organization.
* Communicating with users, vendors, and other IT personnel on security-related issues, providing expert guidance and support.
* Staying up to date on evolving cyber threats, identifying their impact, and detecting them in our environment.
* Managing infrastructure security systems such as HIDS/NIDS, SIEM, NGAV, EDR, UBA, WAF, DLP, and vulnerability management tools to meet regulatory requirements.
* Collaborating with business groups to establish and maintain strong working relationships.

The Impact You Will Have:

* Enhancing the overall security posture of client by leading critical incident response efforts.
* Reducing the impact of cyber threats on client by investigating and responding to security incidents swiftly and effectively.
* Improving the security infrastructure and ensuring compliance with internal and external regulatory requirements.
* Providing expert guidance on security-related issues, fostering a culture of security awareness and best practices.
* Driving continuous improvement in cyber security procedures and documentation, contributing to the organization s resilience against cyber threats.
* Staying ahead of evolving cyber threats and ensuring that the organization's defenses are robust and up-to-date.

What You ll Need:

* Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups.
* Working knowledge of Data Loss Prevention concepts/products, Data Encryption concepts, and endpoint management.
* Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS.
* Familiarity with various cloud environments (AWS, Azure, O365).
* Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements and ability to apply them to an enterprise environment.
* In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems.
* Functional and practical experience with at least one development or scripting language/framework (e.g., PowerShell, Python, .Net) and regular expressions.
* Bachelor's Degree in Information Security, Computer Science, or equivalent combination of education, training, and experience.
* Hold or willingness to obtain certifications such as GCIH, GCFE, GCFA, GCSA, GMON, CISSP, or other relevant security certifications.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10334594
  • Position Id: 8959566
  • Posted 4 hours ago

Company Info

About Javen Technologies, Inc

Javen Technologies is a global information technology company providing consulting, and outsourcing services. Our global delivery model, innovative approach, and industry knowledge allow us to provide cost-effective services that enable our clients to enhance business performance through technology. Javen Technologies is firmly committed to keeping our client success as priority number one. The key to our successful track record is our dedication to information technology services and the strong partnerships we’ve built with our clients. We aim to deliver excellence through our people, knowledge, and methodologies.

We specialize in Web Technologies, IoT, Cloud, MOBILE, UI/UX, ML/AI, ERP, CRM, Data Warehousing, BIG Data, and System Integration.

Javen Technologies has the expertise and capacity to deliver top-quality technology solutions globally, and a proven track record of helping our clients transform their businesses giving them a competitive edge in today’s ever-changing marketplace.

About_Company_One
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Remote

Today

Easy Apply

Contract

Depends on Experience

Remote

Today

Easy Apply

Contract

Depends on Experience

Search all similar jobs