This candidate will be primarily responsible for the security monitoring, with strong business skills, and excellent communication.
Position Responsibilities:
- Performs incident response activities across broad technology profiles or multiple systems
- Interrogates industry sources and evaluates incident indicators
- Determines nature, mechanisms, scope and location of the incident
- Collects and preserves evidence, identifies intrusion or incident path and method
- Performs event correlation and malware analysis
- Isolates, blocks or removes threat access
This position requires the ability to obtain a U.S Security Clearance for which the US Government requires US Citizenship. An interim and/or final U.S. Secret Clearance Post-Start is required
Basic Qualifications (Required Skills/Experience):
- Experience with network security specifically related to malware analysis, monitoring, and log event correlation
- Effective time management, communication, and organizational skills
- Demonstrate analytical and problem-solving skills
Preferred Qualifications (Desired Skills/Experience):
- Experience with Cybersecurity Operation Center
- Experience with monitoring, incident response, or digital forensics
- Effective technical writing, presentation development, facilitation, and organizational skills
- Experience monitoring cloud platforms such as Google Cloud Platform (GCP), Microsoft Azure, and/or Amazon Web Services (AWS).
- Network Security certifications
Typical Education & Experience:
Typically, 2 or more years related work experience or relevant military experience. Advanced degree (e.g. Bachelor, Master, etc.) preferred, but not required.