- Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, a related field, or equivalent practical experience.
- Certified in one or more of the following: GCIH, GCFE, GCFA, GREM, GNFA
- 5+ of experience with investigations in network forensics, host forensics, memory forensics, reverse malware engineering, threat intelligence, and enterprise security architecture. Platforms should be Windows, MacOS, or Linux.
- 2+ years of experience leading incident response investigations, analysis, containment, and remediation actions.
- 1+ years of leadership experience within a SOC or leading IR teams
- SME in multiple cyber security technologies, including firewalls, IDS/IPS, network access control, email and web security, digital forensics, endpoint detection and response, vulnerability scanning and analysis, SIEM, and SOAR technologies.
- Strong experience using SIFT workstation and other digital forensics tools.
- Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
- Ability to communicate investigative findings and strategies to technical staff, executive leadership, internal and external clients, and legal counsel.
- Effective time management skills to balance time among multiple tasks and mentor junior staff as needed.
- Strong analytical and problem-solving skills.
- Willingness to learn and continually improve skills to ensure, not only continued success of the business and its objectives, but continued success of its customers, as well.
- Must be a US Citizen and reside in the continental US.
Other Knowledge, Skills and Abilities
- Master’s degree in Cybersecurity, Computer Science, Information Systems, a related field, or equivalent practical experience.
- Python, PowerShell, bash and other scripting languages is preferred.
- 5+ years experience working within a security operations center
- Ability to lead clients in strategic conversations with strong executive presense.
- Experience in Cloud incident response
- Experience working within 1 or more SOAR platforms preferred.
About Binary Defense
Binary Defense is a trusted leader in security operations, supporting companies of all sizes to proactively monitor, detect and respond to cyberattacks. The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.
With a world-class 24/7 SOC, deep domain expertise in cyber, and sophisticated technology, hundreds of companies across every industry have entrusted Binary Defense to protect their business. Binary Defense gives companies actionable insights within minutes not hours, the confidence in their program to be resilient to ever-changing threats, and the time back that matters most to their business.
Binary Defense is also the Trusted Cybersecurity Partner of the Cleveland Browns and partners with PGA TOUR players. For more information, visit our website, check out our blog, or follow us on LinkedIn.
Binary Defense offers competitive medical, dental and vision coverage for employees and dependents, a 401k match which vests every payroll, a flexible and remote friendly work environment, as well as training opportunities to expand your skill set (to name a few!). If you’re interested in joining a growing team with great perks, we encourage you to apply!