Overview

Provides immediate and detailed response activities to mitigate or limit unauthorized cyber security threats and incidents within an organization. This includes planning and developing courses of action; prioritizing activities; and supporting recovery operations and post-incident analysis.

Responsibilities:
  • Perform real-time cyber defense incident handling tasks (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation)
  • Conduct security triage to identify and analyze cyber incidents and threats
  • Actively monitor networks and systems for cyber incidents and threats
  • Conduct risk analysis and security reviews of system logs to identify possible cyber threats
  • Conduct analysis and review, and/or apply network scanners, vulnerability assessment tools, network protocols, internet security protocols, intrusion detection systems, firewalls, content checkers and endpoint software
  • Collect and analyze data to identify cyber security flaws and vulnerabilities and make recommendations that enable prompt remediation
  • Develop and prepare cyber defence incident analysis and reporting
  • Define and maintain tool sets and procedures
  • Develop, implement, and evaluate prevention and incident response plans and activities, and adapt to contain, mitigate or eradicate effects of cyber security incident
  • Provide incident analysis support on response plans and activities
  • Conduct research and development on cyber security incidents and mitigations
  • Create a program development plan that includes security gap assessments, policies, procedures, playbooks, and training manuals
  • Review, develop and deliver relevant training material
Required Qualifications:
  • Experience with security technologies like firewalls, intrusion detection/prevention systems (IDS/IPS), anti-virus solutions, and SIEM (Security Information and Event Management) platforms.
  • Knowledge of networking protocols (TCP/IP, DNS, HTTP, etc.) and their potential vulnerabilities.
  • Incident response tools and techniques such as forensic analysis, malware reverse engineering, and penetration testing.
  • Operating system proficiency, including Linux and Windows.
  • Understanding of cloud security and CDNs and hands-on experience with platforms such as Cloudflare, Imperva, AWS, Azure, and Oracle Cloud.
  • Experience with scripting and automation using Python, PowerShell, Bash, etc.
  • Threat intelligence skills, including monitoring, analysis, and integration with incident response processes.

Please note: Our intelligent job search engine discovered this job and republished it for your convenience.
Please be aware that the job information may be incorrect or incomplete. The job announcement remains the property of its original publisher. To view the original job and its full details, please visit the job's URL on the owner’s page.

Please clearly mention that you have heard of this job opportunity on https://ijob.am.