What you should have:
Bachelor's degree (or equivalent experience) in Computer Science, Information Security or a related field
10+ years of hands-on experience in SOC or Security Incident response teams
Outstanding organizational and collaborative focus
Ability to lead in challenging scenarios
Experience with public cloud providers like AWS, GCP and Azure along with their security standard and methodologies is required
Experience with cloud, IaaS, PaaS, ‘network-as-a-service’ environment.
Shown Splunk skills (detection creation, queries and dashboard development)
Demonstrated background in security products (Tenable Nessus, Nexpose) and technologies (Public Key Infrastructure (PKI) systems, authentication and authorization mechanisms, encryption of data in transit and data at rest), modern logging technologies (Splunk and Kibana), security engineering, networking protocols (TCP/UDP), security analysis, network and endpoint forensics
Programming experience in Python, shell scripting to automate and integrate with security tools
Focus on collaboration with excellent verbal and written skills to build effective documentation and streamlined incident reports and RCCA artifacts
Ways to stand out from the crowd:
Validated knowledge and technical savvy with Cloud security controls (security groups, Cloud Trail logs, IAM, EC2, S3, Kubernetes best security practices. etc.)
Understanding of industry compliance standards relevant to Software as a Service and Cloud Computing, such as ISO27001, SOC2, NIST, HIPPA and PCI-DSS
Familiarity with common DevOps technologies such as Ansible, Dockers, Terraform, Kubernetes along with strong Linux fundamentals is a plus
One or more security certifications (CISSP, SSCP, CSSP, GISP, Security+, etc.)
Previous experience in tacking security challenges in a Hybrid cloud environment (workloads spread across on-premise data center and public cloud such as AWS)
Bachelor’s Degree