Description

Job description

Involved in the testing, implementation and operation of secure state-of-the-art internet-facing services, systems, networks, and database products in both hosted and cloud environments. Conducts risk assessments and provides recommendations for system and application design. Participates in a wide range of security activities including event correlation, alerting, vulnerability management, access management, incident response, troubleshooting, infrastructure management, audit support and more. Analyses are performed through all stages of the system lifecycle, including: concept, design, build, test, integration, operation, maintenance and disposal. Provides analysis, evaluations, and recommendations to improve system consistency, efficiency, and effectiveness. Helps ensure solution requirements meet timing, technical, and financial constraints. Integrates new features into existing solutions, provides analysis to evaluate existing systems against future needs and trends. Uses advanced forensic tools and techniques for investigation and attack reconstruction. Provides recommendations for enhancements to systems, testing and processes. Interacts with other internal groups and external entities including customers, law enforcement, and intelligence/government agencies.

Technical Work:

Operation of infrastructure and application vulnerability detection systems
conduct penetration testing and resolving the vulnerabilies
Review and validation of vulnerability findings
Work with stakeholders to resolve vulnerabilities
Analyze log data for emerging or unusual patterns
Modify, create or propose alerts for events of interest
Help monitor common channels for priority communications
Ensure systems meet documented standards
Assist with obtaining or creating artifacts for audit and compliance
Request and incident ticket intake and escalation
Learn and document common processes with senior resources
Participate in on-call rotation
Assist with disaster recovery and incident response testing and processes
Research and test emerging threats

Qualifications and Experience

3+ years general technology experience
1+ years general security experience
Familiar with basic information security practices
Familiar with Kali Linux and security tools
Desire for growth and development of security skills
Excellent verbal and written communication skills
Strong ability to multi-task, react and think quickly
Ability to maintain a high level of confidentiality
Must be flexible enough to work overtime when needed
 

Education

ANY GRADUATE