Job Description:
- Grasps concepts of anomaly identification and incident response
- Ability to build and document Standard Operating Procedures (SOP)
- Familiarity with prevalent cyber threats, such as malware, phishing attacks, and DDoS attacks.
- Has the ability to digest data and understand the relationship between the data.
- Ability to follow SOPs but also improve them.
- Solid understanding and experience of Microsoft Defender and Azure tools.
- Familiarity with Vulnerability Management tools, Incident Response, Endpoint Detection and Response
A strong understanding of the following:
- Security information and event management (SIEM) tools
- Incident response procedures and methodologies
- Endpoint detection and response (EDR) solutions
- Intrusion detection/prevention systems (IDS/IPS)
- Firewalls, proxies, and other network security devices
- Vulnerability assessment and penetration testing
- Network security concepts
- Substantial work experience in relevant cybersecurity or related field is required.
Education:
- A bachelor's degree in a related field such as computer science, information technology, cybersecurity, or a similar discipline.
Certifications are a plus:
Some common certifications include:
- CompTIA Security+
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
- Certified Ethical Hacker (CEH)
- GIAC Security Essentials (GSEC)