Job Purpose
This role reports will assist in incident response, threat hunting, and forensics. The ideal candidate will have a well-rounded background in endpoint, OS, networking defense and security incident response.
This role will serve as an incident responder to assess the risk, impact, and scope of identified security threats, as well as leading the response efforts to include containment, eradication, and recovery. Responsible for designing, implementing, managing, and monitoring the overall security posture of the organization globally.
Key Responsibilities
- Participate in detecting, investigating, and resolving security events
- Lead computer security incident response activities for highly complex events
- Help implement log source integration to SIEM
- Serve as an escalation point for difficult problems and complex inquiries
- Provide Subject Expertise on Endpoint Security Technologies including the design, configuration, integration, and deployment of enterprise security tools
- Conduct or assist with forensic investigations and preservation of electronic data from a wide range of information technology environments and platforms
- Learn the proper methods and techniques used for conducting forensic investigations. Show the ability to learn and understand advanced skills
- Ability to problem-solve—to own problems, identify and work with the right people to solve problems quickly within own team and across teams
- Participate in detecting, investigating, and resolving security events
- Lead computer security incident response activities for highly complex events
- Help implement log source integration to SIEM
- Serve as an escalation point for difficult problems and complex inquiries
- Provide Subject Expertise on Endpoint Security Technologies including the design, configuration, integration, and deployment of enterprise security tools
- Conduct or assist with forensic investigations and preservation of electronic data from a wide range of information technology environments and platforms
- Learn the proper methods and techniques used for conducting forensic investigations. Show the ability to learn and understand advanced skills
- Ability to problem-solve—to own problems, identify and work with the right people to solve problems quickly within own team and across teams
Required Skills
Working knowledge of network ports and protocolsComfortable navigating and troubleshooting Linux and Windows system issuesExcellent client relationship and customer service skills, with a clear client focusHigh degree of independence and exceptional work ethic with a team player attitude and a solution-oriented mindFamiliarity with core IT and Information Security TechnologiesExceptional interpersonal, written, and oral communication skillsRequired Experience
See Qualifications sectionExperience with privacy and risk management tools3+ years of practical experience in compliance & data security programsSecurity certifications CEH, Security +, CHFI desiredTungsten Automation Corporation, Inc. is an Equal Opportunity Employer M / F / Disability / Vets
While the job description describes what is anticipated as the requirements of the position, the job requirements are subject to change based upon any changing needs and requirements of the business.
Skills Required
Forensics, Incident Response, Threat Hunting