Responsibilities:
- Monitor security systems and networks for potential threats and vulnerabilities.
- Respond to security incidents conduct investigations and perform root cause analysis.
- Coordinate with other departments and external entities during incident response.
- Maintain and update incident response plans and playbooks.
- Stay up-to-date with the latest security trends technologies and threats.
- Recommend and implement enhancements as needed to incident response procedures tools and controls.
- Work with various stakeholders on the appropriate tactics to protect the organization.
- Proactively work with partners and suppliers to achieve objectives on time and within budget.
- Direct and/or take appropriate action with partners to build enterprise class solutions respond to issues/threats and communicate to stakeholders.
- Actively engage in the greater Information Security and privacy community (e.g. peer groups seminars conferences etc.) to help identify new technologies new techniques and new partners.
Key Qualifications:
- 5 years of relevant experience is required.
- 3 years of experience working in incident response roles.
- Bachelors degree in Computer Science Management Information Systems Information Security or equivalent is required.
- Cybersecurity certifications (e.g. CISSP GIAC certifications etc.) are preferred.
- Experience working with CIS Critical Controls NIST CSF and ISO 27001 frameworks are preferred.
Technical Skills and Abilities
- Strong interpersonal written and verbal communication skills
- Demonstrated experience working with a team to solve technical problems.
- Ability to focus on and achieving results.
- Demonstrated reliability and follow through on commitments and assignments.
- Demonstrate professionalism and courtesy in all interactions.
- Demonstrated ability to implement security best practices.
- Work well under pressure (i.e. a critical system is down)
- Able to work independently and as part of a team.
- Working knowledge of scripting (PowerShell Python Perl etc.)
- Working knowledge of core network and systems administrator protocols
- Working knowledge of network solutions/technologies
- Experience working with Security Information and Management (SIEM) and Security Orchestration and Automation Response (SOAR) platforms.
- Experience with EDR solutions.
- Ability to analyze and interpret security logs and data.
- Experience with and ability to implement security best practices.
- Experience with security tools (vulnerability scanners sniffers log correlation tools)
- Experience with Windows Linux and Mac operating systems
This role is based in our Columbus OH or Washington D.C. office. A reasonable rate of compensation for this position is between $90000-$100000 per year.
Required Experience:
IC