What are the responsibilities and job description for the Cyber Security Administrator position at Meneses Law?
For this role, we are looking for a curious and innovative team member with a passion for cyber threat identification and remediation, information security operations, automation, customer service, and program development skills. As a Cyber Security Research and Hunting Analyst (R&H), you'll be partnering with multiple functions in Cyber Threat and Incident Response team who are responsible for ensuring that our digital estate is protected from threats.
You will be working alongside a diverse team and be a vital contributor to identifying, triaging, and managing threats and risks in the cyber environment. You will also act to ensure that Meneses Law digital estate is protected from threats both known and unknown.
You will use your cyber threat intelligence, incident response and / or digital forensics experience to assist with buildout and development of the Research and Hunt function here at Meneses Law. You will be willing to share your knowledge by integrating in to or leading specialized cross functional investigation teams and you'll provide realistic but out-of-the-box thinking for incident response and hunt development, you'll also be seen as a subject matter expert for threats faced by the group.
You will need to bring strong knowledge of adversary methodologies and toolsets, as well as operational experience across multiple domains, and operating systems to be successful in this position. An understanding of logging, correlation, and enrichment techniques are also vital for investigations thoroughness and continuity. Your knowledge of IT security principles and the ability to multitask will allow you to deliver in high pressure situations.
- You understand the difference in, and importance of subjective and objective data and documentation
- You understand logging, correlation, and enrichment techniques from a variety of sources
- You have demonstrated an ability to capture and generate cyber threat intelligence which can be used by incident response teams and other relevant stakeholders
- Create cybersecurity reporting metrics, dashboards, and scorecards.
- Analyze firewall logs, Full Packet Capture (PCAP), IDS alerts, Anti-malware alerts, Host Intrusion Prevent System (HIPS), and server and application logs to investigate events and incidents for anomalous activity and produce reports of findings.
- You have demonstrated an ability to prioritize, research and document threat activity
- Detailed understanding of common cyber security analytic frameworks and models
- You have an interest or experience working within a red or purple team environment
- You may be able to bring a suite of DFIR skills to the team
- You may be able to bring advanced static and dynamic analysis, and reverse engineering to the team
- Your curiosity and drive for continuous learning and development of yourself and those around you will set you ahead of the pack
- You'll understand the human element as much as the malware element. You'll understand methodologies, toolsets, and motives of different threat families and what they mean
- Conduct ethics and compliance investigations in coordination with Compliance & Human Resources.
- Perform other duties or assigned tasks based on departmental needs.
Qualifications :
Job Type : Full-time
Benefits :
Education :
Experience :
License / Certification :
Certified Information on Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Shared Assessments Certified Third Party Risk Professional (CTPRP) or Certified Third Party Risk Assessor (CTPRA), Information Systems Security Architecture Professional (ISSAP), Information Systems Security Engineering Professional (ISSEP)
To join a high performing Cyber team, apply online now or for more information visit
Job Type : Full-time
Pay : From $65,000.00 per year
Benefits :
Schedule :
Education :
Experience :
Work Location : In person
Salary : $65,000