Start Date
Immediate
Expiry Date
17 Oct, 25
Salary
0.0
Posted On
18 Jul, 25
Experience
2 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Cloud, Ccna, Ml, Network Traffic Analysis, Cyber Security, Access, Eligibility, Disabilities, General Technology, Incident Response, Information Technology, Computer Engineering, Scanning, Life Insurance, Security+, Computer Science, Savings Accounts, Microsoft Azure, Gcia
Industry
Information Technology/IT
PLEASE REVIEW THE FOLLOWING JOB DESCRIPTION:
The Cyber Operations Specialist is an experienced SOC role within the 24/7 Cyber Fusion Center (CFC) organization. The role is responsible for monitoring, triaging, and escalating security events properly in any technology environment.
This role will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS alerts, firewalls, network traffic logs, cloud platforms, and SOAR solutions) to analyze events that occur within their environments for the purposes of mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis.
REQUIRED QUALIFICATIONS:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor’s degree in Computer Science, Computer Engineering, Cybersecurity, or related field of relevant education, certification, or related training.
2. Two years of experience in Cybersecurity or related work
3. Knowledge of cloud fundamentals
4. Knowledge of general information technology (IT) and cybersecurity
5. Knowledge of computer networking concepts and protocols, and network security methodologies.
6. Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
7. Knowledge of operating systems, including Windows/Unix ports and services.
8. Knowledge of basic identity and access management concepts
9. Knowledge of phishing tactics and techniques
10. Knowledge of cyber threats and vulnerabilities.
11. Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
12. Knowledge of incident response and handling methodologies.
13. Knowledge of countermeasures to address a variety of threats
14. Knowledge of basic automation, ML, and/or AI possibilities.
PREFERRED QUALIFICATIONS:
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
1. Characterize and analyze alerts to understand potential threats.
2. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
3. Document and escalate incidents that may cause ongoing and immediate impact to the environment.
4. Provide daily summary reports of events and activity relevant to cyber operations.
5. Perform cyber Operations trend analysis and reporting.
6. Perform thorough and high-quality triage and analysis for all alerts.
7. Demonstrate strong communication skills both written and verbal.
8. Actively engage in team chats, calls, and face to face settings.
9. Constantly contribute to SOC runbooks.
10. Recommend improvements to automations, alert fidelity, and security controls.