Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
Job Description
· Certified experience in Enterprise Managed Security Services focused on Incident response activities
· Strong knowledge of tools used for network security
· Understanding of basic attack and defense techniques
· Develop and follow detailed operational processes and procedures
· Analyze, escalate and assist in the remediation of information security incidents.
· Prioritize multiple tasks and formulate responses/recommendations to customers.
· Provide assistance to other incident response teams.
· Apply technical acumen and analytical capabilities to speed and enhance response.
· Capable of following an investigative process
· Strong Operating System understanding (Linux & Windows)
· High level understanding of malware identification/remediation processes
· Ability to document and explain technical details in a concise, understandable manner
· Ability to read and understand diverse log sources quickly
· Research and document threats and their behavior.
· Good understanding of incident response & forensics tools including redline, volatility, FTK, Encase, Photorec, Bulk extractor, etc.
· Good understanding of Packet analysis tools (tcpdump, Wireshark, ngrep, etc.)
· Working knowledge with tools such as: Web App Tools Intercepting proxies (e.g. Burp Proxy, Paros Proxy, etc.) and automated scanners (e.g. Nessus, Acunetix, WebInspect, Netsparker, nikto, Skipfish)
· Working knowledge with Exploitation Tools - Metasploit, Karmetasploit, BurpSuite, BackTrack/Kali Linux, SQLMap, Social Engineering Toolkit
You'll no longer be considered for this role and your application will be removed from the employer's inbox.