Apply๐ United States
๐ธ 116600.0 - 159900.0 USD per year
๐ Cyber Security
๐ข Company: Optiv_Careers
- 6+ years operational experience assessing, reviewing, and remediating infrastructure vulnerabilities, CVEโs, and risks
- Knowledge of third-party software vulnerabilities, security threat landscape, especially network and server threats
- Knowledge of cyber security threats and risks, vendor computing environments, basic systems, and network technologies
- Experience with and understanding of CVEโs and CVSS scores
- Knowledge of compensating controls and mitigating factors
- Knowledge of Information Security frameworks, guidelines, and standard methodologies
- Knowledge of the Windows and / or Linux operating systems
- Knowledge and understanding of Cybersecurity controls and logging and monitoring tools
- Expertly interact with all levels of personnel
- Excellent verbal and written communication skills
- Strong in problem solving and analytical skills
- Ability to work on multiple projects by prioritizing and results oriented approach
- Good teammate with flexibility required for support operations
- Be well versed in the cyber threat landscape; have an advanced understanding and knowledge of what tactics and techniques are being used by adversaries; have an advanced understand and knowledge of what security controls and/or telemetry data is available to detect these tactics and techniques; and be familiar with cyber security incident response terminology, processes, and techniques
- Moderate to complex investigations (multiple tools) including endpoint, UEBA, public cloud, SAAS and packet analysis
- Security use case design recommendations for threat detection
- Threat response activities such as quarantining host and other common response playbook activities
- Proactive threat hunting using multiple client tools
- Process development and documentation
- Application of threat intelligence to improve detection and response capabilities
- Extensive experience with the MITRE @ttack framework and associated tactics
- Extensive alert triage and endpoint investigations using technologies such as EDR
- Phishing analysis
- Malware analysis (does not include reverse engineering)
- MITRE attack framework expertise and understanding of common attack tactics used by threat actors
- Provide recommendations on tuning of security detection platforms and use cases to improve accuracy of detection
- Knowledge AWS, Azure, GCP cloud service technology
- Basic fraud and insider threat specific investigation skills
- Knowledge of metrics and reporting with the use of data visualization tools such as Tableau
- Demonstrable data analytics skills
- Must have a passion for data analysis
- Operate independently in a geographically dispersed team, while maintaining situational awareness and keeping the team up to date
- Perform security monitoring and incident response activities across the networks, leveraging a variety of tools and techniques
- Detect incidents through proactive โhuntingโ across security-relevant data sets
- Thoroughly document incident response analysis activities
- Review investigations conducted by more junior analysts to ensure quality standards are met
- Develop new, repeatable methods for finding malicious activity across the networks
- Provide recommendations to enhance detection and protection capabilities
- Regularly present technical topics to technical and non-technical audiences
- Develop and follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of information security incidents
- Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a fast-paced environment
- Provide assistance to other security teams
- Continually develop new technical skills and push overall team capabilities forward
- Engage with and mentor other team members
- Work with other teams on major engineering and architecture initiatives
- Be innovative with their understanding of attack methodologies, malware analysis, malicious toolkits, and how those may manifest within various security technologies
- Advanced proactive threat hunting
- Understands advanced adversary emulation concepts
- Advanced use case design for insider threat, operational, threat detection and response
- Review of defensive and detective controls to reduce client attack surface
AWSCloud ComputingCybersecurityData AnalysisGCPTableauAzureData visualizationScripting
Posted about 10 hours ago
Apply