|
|
Job Description: |
MINIMUM REQUIRED QUALIFICATIONS TO PERFORM POSITION |
Experience Requirements | Eight (8) or more years IT experience with at least five (5) years in a cybersecurity role with a focus on protect, detect, and respond in addition to the following: - Mitre ATT&CK and Cyber Kill Chain frameworks
- Establishing or participating in Blue Team exercises
- In-depth knowledge of computer operating systems such as Windows, MacOS and Linux.
- System development lifecycle.
- Deploying, managing, and using Security Operations tools such as SIEM, EPM, DLP, Vulnerability Management, Firewalls, WAFs, Antivirus Solutions, Email Protection Solutions, Incident Response and Threat hunting and management.
- Scripting experience such as PowerShell, JavaScript, or Python.
- Experience working with Identity and Access Control Management Tools.
|
Educational Background | Associate s degree with a major in computer related field or similar technical field from an accredited institution required. In lieu of the required degree, a minimum of two (2) years of cybersecurity work experience is required. This experience is in addition to the minimum years listed in the Experience Requirements above. |
Professional Certification | Any relevant security certifications preferred. |
Professional Licenses | [Indicate the professional licenses required or preferred (e.g. nursing licenses)]. |
Knowledge | Knowledge of the following: - SIEM and SOAR
- ATT&ACK and Cyber Kill Chain frameworks
- Blue Teaming
- Endpoint protection technologies
- Cloud technologies
- OSI Model layers, IP Routing, TCP/IP Operation
- Scripting experience such as PowerShell, JavaScript, or Python
- Computer forensics knowledge and experience
- Security standards such as HIPAA, NIST 800-53, NIST CSF, Zero Trust Architecture, and others
- Vulnerability scanning technologies
- Security monitoring and incident response
- Risk analysis and risk mitigation strategies
- Networking technologies and networking protocols with an emphasis on TCP/IP
- Defense in Depth strategies
- Security Operations Tools such as SIEM, EPM, DLP, Vulnerability scanners, Firewalls, WAFs, Antivirus Solutions, Email Protection Solutions, Incident Response and Threat Management
- Advanced Persistent Threats (APT) and associated tactics
- Identifying indicators of compromise and indicators of attack
- Vulnerability management
- Cloud security and/or technologies
- Computer operating systems such as Windows, MacOS and Linux
|
Skills | Strong planning, organization, critical thinking, decision-making and communication (verbal and written) skills. |