Job Description:
• Independently lead computer incident investigations.
• Leverage, implement, and fine tune Incident Response tools.
• Conduct in-depth analysis of cyber threat data.
• Maintain a functional Cyber Incident Response lab.
• Backup the Security Operations Manager.
• Execute, develop, and document Incident Handling Guides.
Requirements:
• Minimum 3-5 years of experience in Information Security
• Bachelor of Science Degree with a concentration in Computer Science, or Information Technology, or equivalent prior work experience in a related field.
• One or more industry certifications (or achieve within 6 months): CISSP, GCED, CEH, GCIH, GCFA, GCFE, etc.
• Knowledge of Endpoint Detection & Response tools (CrowdStrike preferred)
• Knowledge of the Windows Operating System
• Knowledge of Splunk and writing SPL.
• Experience in Vulnerability Assessment, IDS/IPS configuration/monitoring, E-Mail security, Firewalls, TCP/IP packet analysis, Log analysis.
• Knowledge of Information Security products and systems.
• Extensive knowledge and understanding of operating system internals, network security architecture, and protocol analysis.
• Knowledge of networking protocols and authentication methods.
• Proficient in at least one scripting and/or object-oriented language.
• Proficient in at least one means of transactional data processing and/or data manipulation.
• Familiar with the most common forms of web development.
• Familiar with current Pen Testing techniques and tools.
• Understanding of incident response methodologies and technologies.
• Strong analytical skills, creative thinking, and knowledgeable of security operations.
• Strong communication skills are necessary,
• Willing to participate in on-call rotation for emergency cyber security situations.
Benefits:
• EOE including disability/veteran
• At Anywhere, compensation varies by knowledge, skills, and experience. Bonuses, incentives and benefits, depend on the position
Apply Now
Apply Now