Overview
On Site
$30 - $45
Contract - W2
Contract - 6 Month(s)
Skills
Cyber Security
Information Retrieval
Information Security
Information Systems
Investor Relations
Incident Management
Information Technology
International Relations
Intrusion Detection
Computer Science
Data Governance
Event Management
IT Management
Management
Network Monitoring
Security Architecture
Security Clearance
Optimization
Regulatory Compliance
Root Cause Analysis
SIEM
System Monitoring
Taxes
Threat Analysis
Training
Vulnerability Assessment
Vulnerability Management
IDS
Job Details
*Candidate MUST be local to Metro Atlanta* ** -Permanent Resident** *Tax Clearance Letter, due at the time of submission* (pls review compliance tab for instruction on how the CANDIDATE must obtain this letter
- Experience and demonstrated success in technology leadership with emphasis on information security and data governance.
- Experience with cybersecurity tools, such as SIEM, EDR, and IDS.
Entry Qualifications
Bachelor's degree in Computer Science/Information Technology/Information
Security or related field or equivalent experience and four (4) years of proven
experience and demonstrated success in technology leadership with emphasis on
information security and data governance.
Key Responsibilities:
Advanced Threat Hunting:
Proactively search for sophisticated, covert threats that evade
automated detection.
Possess a deep understanding of cybersecurity threats,
vulnerabilities, security frameworks, and monitoring tools.
Complex Incident Response:
Investigate, triage, and respond to security incidents,
documenting findings for root cause analysis.
Vulnerability Assessment:
Conduct in-depth vulnerability assessments and analyze asset
discovery data to identify security gaps.
Security Architecture:
Design and implement security solutions, often involving threat
intelligence platforms and other advanced security technologies.
System Monitoring & Response:
Actively monitor networks for unauthorized activities and respond to
security incidents.
Tool Optimization:
Evaluate and optimize existing cybersecurity tools, such as SIEM,
EDR, and IDS, and recommend new technologies or processes.
Threat Intelligence Integration:
Integrate various threat intelligence feeds into platforms like MISP
to enhance detection capabilities.
Skills and Competencies:
Deep Technical Expertise:
Mastery of intrusion detection systems (IDS), endpoint detection and
response (EDR), and security information and event management (SIEM)
9/16/25, 9:17 AM State of Georgia
_tabReq:ContentPH_pnlSkills 4/6
Required/Desired Skills
platforms.
High-level proficiency in computer science and information systems,
network monitoring, and security software.
Vulnerability Management:
Experience and skills with vulnerability assessment tools and techniques.
Threat Intelligence:
The ability to gather, integrate, and analyze threat intelligence from various
sources.
Incident Response (IR):
In-depth knowledge of IR best practices and the ability to manage complex
incidents.
Proactive Defense:
A mindset focused on proactive threat hunting and prevention rather than
just reaction.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.