Reponsabilities

  • Intrusion monitoring, attack analysis, and incident response duties as required and directed.
  • Monitor open source feeds and reporting on the latest threats against computer network defenses.
  • Supports incident escalation and assesses probable damages, identifies damage control and remediation, and assists in developing courses of action.
  • Coordinate efforts of and provide timely updates to multiple teams during response
  • Assists with implementation of counter-measures or mitigating controls
  • May be called upon to assist with other Cybersecurity efforts such as firewall hardening and change control recommendation
Knowledge and Skills Required:

  • Understanding of OSI model, network port, protocol and service expertise
  • Understanding of network security best practices
  • Experience with Windows and Linux Operating Systems and common applications
  • Understanding of normal operating system behavior.
  • Experience with the use of network analysis tools and network security devices (firewalls, proxies, etc.)
  • Understanding of core networking concepts (TCP/IP, etc.) and common protocols (HTTP, FTP, etc.)
  • Understaning of digital forensics, including one or more of the following a strong plus:
  • file system, registry, etc. artifacts commonly associated with malware or malicious activities.
  • Memory analysis
  • Malware reverse engineering
  • Familiarity with automation concepts and proficiency in scripting languages such as python, perl, ruby, javasscript, powershell, etc.
  • Strong analytical skills and critical thinking skills
  • Effective communication skills (both written and verbal)
  • Sound decision-making and judgment, especially under pressure.
  • Strong organization, prioritization, and rationalization skills.
Education and Experience Required:

  • Bachelor's Degree or higher in the field of Computer Science or or related field (may be substituted for experience and industry certifications).
  • 1-2 years of experience in software developments using Python or related technology field preferred
  • Individual technical Cyber Security Certification.

We use cookies in order to personalize the content and advertisements, to propose functions of connection with the social networks and to analyze the frequentation of our site. We also share information about your use of our site with our partners in the areas of social networking, advertising and analytics.You can manage your preferences in Cookie Settings. By using this website, you consent to the use of cookies. TISALABS Privacy Statement