What are the responsibilities and job description for the Info Security Specialist III position at DivIHN Integration Inc?
Duties: As a Detection Engineer at CNA, your primary focus will be on implementing, configuring, and maintaining security detection rules and mechanisms within our on-premise and Google Cloud environments. Your expertise will contribute to our mission of safeguarding our assets and ensuring the highest level of security for our cloud infrastructure. This role requires in-depth knowledge of detection engineering, incident response, investigations, and emerging threat trends.
Skills: MITRE ATT&CK Framework: Utilize the MITRE ATT&CK Framework for threat detection creation, gap assessment and analysis. Security Detection Implementation: Implement, configure, and maintain security detection rules and mechanisms, including intrusion detection, anomaly detection, and log analysis tools, to identify and respond to security incidents. Security Operations: Play a critical role in the day-to-day security operations, including monitoring, tuning, analysis, and proactive threat hunting. Incident Response: Lead incident response efforts, investigate security incidents, conduct root cause analysis, and implement corrective measures. Kubernetes Incident Response: Apply expertise in Kubernetes for incident response and forensic analysis. Security Automation: Develop and maintain automation scripts and tools to streamline security detection operations and response. Documentation: Maintain comprehensive documentation of security detection configurations, incident response procedures, and investigations. Stay Current: Stay up-to-date with the latest security threats, vulnerabilities, and industry trends to proactively enhance security detection measures.
Education: Bachelor's degree or a related field experience Google Cloud Professional Cloud Security Engineer certification or equivalent experience. Experience with cloud security detection tools and technologies, including intrusion detection, anomaly detection, and log analysis. Proficiency in scripting and automation (e.g., Python, Bash). Experience in incident response, investigations, and security operations. Proficiency in Kubernetes with a focus on incident response and forensic analysis. Familiarity with the MITRE ATT&CK Framework for threat detection and mitigation. Experience working with Splunk Enterprise Security or similar SIEM solutions. Experience working with threat emulation solutions like Atomic Red Team, PurpleSharp, Safebreach ,etc.. Experience with CI/CD pipelines and Test Driven Development using Python Excellent problem-solving and analytical skills. Strong communication and teamwork skills. Relevant certifications such as CISSP, GCIH, GCIA, Certified Kubernetes Administrator (CKA), or Splunk certifications are a plus.
Required Skills: INCIDENT RESPONSE,ANOMALY DETECTION,CLOUD SECURITY,SCRIPTING,SIEM,
Additional Skills: SELF MOTIVATED,SHELL SCRIPTING,PROBLEM-SOLVING,DOCUMENTATION,FORENSIC,CISSP,GOOGLE CLOUD,MITIGATION,CONTINUOUS INTEGRATION/DELIVERY,CNA,SPLUNK,KUBERNETES,ARTIFICIAL INTELLIGENCE,INTRUSION DETECTION,OPERATIONS,PYTHON,
Hours Per Day: 8.00
Hours Per Week: 40.00
Languages: English( Speak, Read, Write )
Department: Security Operations : 0001141
Job Category: Information Technology
Skills: MITRE ATT&CK Framework: Utilize the MITRE ATT&CK Framework for threat detection creation, gap assessment and analysis. Security Detection Implementation: Implement, configure, and maintain security detection rules and mechanisms, including intrusion detection, anomaly detection, and log analysis tools, to identify and respond to security incidents. Security Operations: Play a critical role in the day-to-day security operations, including monitoring, tuning, analysis, and proactive threat hunting. Incident Response: Lead incident response efforts, investigate security incidents, conduct root cause analysis, and implement corrective measures. Kubernetes Incident Response: Apply expertise in Kubernetes for incident response and forensic analysis. Security Automation: Develop and maintain automation scripts and tools to streamline security detection operations and response. Documentation: Maintain comprehensive documentation of security detection configurations, incident response procedures, and investigations. Stay Current: Stay up-to-date with the latest security threats, vulnerabilities, and industry trends to proactively enhance security detection measures.
Education: Bachelor's degree or a related field experience Google Cloud Professional Cloud Security Engineer certification or equivalent experience. Experience with cloud security detection tools and technologies, including intrusion detection, anomaly detection, and log analysis. Proficiency in scripting and automation (e.g., Python, Bash). Experience in incident response, investigations, and security operations. Proficiency in Kubernetes with a focus on incident response and forensic analysis. Familiarity with the MITRE ATT&CK Framework for threat detection and mitigation. Experience working with Splunk Enterprise Security or similar SIEM solutions. Experience working with threat emulation solutions like Atomic Red Team, PurpleSharp, Safebreach ,etc.. Experience with CI/CD pipelines and Test Driven Development using Python Excellent problem-solving and analytical skills. Strong communication and teamwork skills. Relevant certifications such as CISSP, GCIH, GCIA, Certified Kubernetes Administrator (CKA), or Splunk certifications are a plus.
Required Skills: INCIDENT RESPONSE,ANOMALY DETECTION,CLOUD SECURITY,SCRIPTING,SIEM,
Additional Skills: SELF MOTIVATED,SHELL SCRIPTING,PROBLEM-SOLVING,DOCUMENTATION,FORENSIC,CISSP,GOOGLE CLOUD,MITIGATION,CONTINUOUS INTEGRATION/DELIVERY,CNA,SPLUNK,KUBERNETES,ARTIFICIAL INTELLIGENCE,INTRUSION DETECTION,OPERATIONS,PYTHON,
Hours Per Day: 8.00
Hours Per Week: 40.00
Languages: English( Speak, Read, Write )
Department: Security Operations : 0001141
Job Category: Information Technology
About us:
DivIHN, the 'IT Asset Performance Services' organization, provides Professional Consulting, Custom Projects, and Professional Resource Augmentation services to clients in the Mid-West and beyond. The strategic characteristics of the organization are Standardization, Specialization, and Collaboration.
DivIHN is an equal opportunity employer. DivIHN does not and shall not discriminate against any employee or qualified applicant on the basis of race, color, religion (creed), gender, gender expression, age, national origin (ancestry), disability, marital status, sexual orientation, or military status.