Salary
💰 $94,676 - $128,092 per year
Tech Stack
CloudCyber SecurityLinuxOpen SourcePythonSplunkTCP/IP
About the role
- Perform forensic analysis of digital information and handle evidence
- Identify network computer intrusion evidence and perpetrators
- Lead analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24x7 SOC to detect, verify, and respond to cyber threats
- Serve as technical escalation point and mentor junior SOC analysts
- Investigate incidents, analyze attack methods, and research new defense techniques and tools
- Develop security policy and document SOC procedures
- Perform malware and attack analysis to extract indicators of compromise
- Correlate data security events across systems and prepare internal and client-facing reports
- Maintain familiarity with industry trends and security best practices
- Ensure compliance with SLAs, process adherence, and process improvement to meet operational objectives
Requirements
- Active SECRET security clearance (Must Currently Possess: Secret)
- US Citizenship Required
- Bachelor’s degree in IT, Cybersecurity, or related field (or equivalent work experience)
- 7+ years of related experience
- Strong knowledge of TCP/IP protocols and basic networking
- Ability to parse/analyze network logs (proxy, firewall, antivirus, email, etc.)
- PCAP analysis (Wireshark familiarity, Trellix)
- IDS knowledge (Snort, Suricata, etc.)
- Familiarity with attack/exploit techniques (OWASP Top 10, command injection, obfuscated code identification)
- Significant expertise in SIEM (Splunk, ArcSight, CrowdStrike, etc.)
- Threat Intelligence (open source feeds, IOCs, known APT TTPs)
- Threat Hunting skills and analyst mindset
- Scripting skills (ideally Python, PowerShell, Bash)
- Command Line Interface Linux basics (root, directory structure)
- Knowledge of Enterprise Windows configurations (Active Directory)
- Strong written communication skills