Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailMonitor analyze and respond to security events using SIEM IDS/IPS and firewall tools.
Lead incident response efforts including triage containment eradication and recovery.
Perform digital forensics and malware analysis to investigate security breaches and anomalies.
Conduct root-cause analysis and develop remediation strategies to mitigate risks.
Develop and maintain security use cases playbooks and automation scripts to improve SOC efficiency.
Implement and manage data loss prevention (DLP) policies and tools.
Collaborate with cross-functional teams to strengthen security posture and align with regulatory requirements.
Stay current on threat intelligence emerging attack vectors and security best practices.
5 years of experience in cybersecurity operations incident response or SOC environments.
Hands-on expertise with IDS/IPS SIEM tools (e.g. Splunk QRadar ArcSight Elastic) and firewall technologies.
Strong knowledge of incident response methodologies digital forensics and malware analysis.
Experience with DLP solutions anomaly detection and threat hunting techniques.
Familiarity with industry frameworks (NIST ISO 27001 MITRE ATT&CK).
Excellent problem-solving analytical and communication skills.
CISSP Certified Information Systems Security Professional
GCIH GIAC Certified Incident Handler
GNFA GIAC Network Forensic Analyst
GCFA GIAC Certified Forensic Analyst
Experience in federal financial or healthcare environments.
Knowledge of scripting/automation (Python PowerShell etc.) for incident response.
Cloud security exposure (AWS Azure GCP).
Full-time