Description

What you should have:

Bachelor's degree (or equivalent experience) in Computer Science, Information Security or a related field

10+ years of hands-on experience in SOC or Security Incident response teams

Outstanding organizational and collaborative focus

Ability to lead in challenging scenarios

Experience with public cloud providers like AWS, GCP and Azure along with their security standard and methodologies is required

Experience with cloud, IaaS, PaaS, ‘network-as-a-service’ environment.

Shown Splunk skills (detection creation, queries and dashboard development)

Demonstrated background in security products (Tenable Nessus, Nexpose) and technologies (Public Key Infrastructure (PKI) systems, authentication and authorization mechanisms, encryption of data in transit and data at rest), modern logging technologies (Splunk and Kibana), security engineering, networking protocols (TCP/UDP), security analysis, network and endpoint forensics

Programming experience in Python, shell scripting to automate and integrate with security tools

Focus on collaboration with excellent verbal and written skills to build effective documentation and streamlined incident reports and RCCA artifacts

 

Ways to stand out from the crowd:

Validated knowledge and technical savvy with Cloud security controls (security groups, Cloud Trail logs, IAM, EC2, S3, Kubernetes best security practices. etc.)

Understanding of industry compliance standards relevant to Software as a Service and Cloud Computing, such as ISO27001, SOC2, NIST, HIPPA and PCI-DSS

Familiarity with common DevOps technologies such as Ansible, Dockers, Terraform, Kubernetes along with strong Linux fundamentals is a plus

One or more security certifications (CISSP, SSCP, CSSP, GISP, Security+, etc.)

Previous experience in tacking security challenges in a Hybrid cloud environment (workloads spread across on-premise data center and public cloud such as AWS)

Education

Bachelor’s Degree