Must be familiar with current and proposed laws, regulations, industry standards, and ethical requirements related to information security and privacy.
Strong working knowledge of information systems security standards. and practices
Knowledge of the common attack vectors on the various OSI layers
Knowledge of different classes of attacks \\(e\\.g\\., passive, active, insider, close\\-in, distribution\\)\\
Knowledge of different operational threat environments \\(e\\.g\\., first generation \\[script kiddies\\], second generation \\[non\\- nation state sponsored\\], and third generation \\[nation state sponsored\\]\\)\\
Knowledge of basic system administration, network, and operating system hardening techniques\\
Knowledge of network security architecture concepts including topology, protocols, components, and principles \\(e\\.g\\., application of defense\\-in\\-depth\\)\\.\\-\\-
Knowledge of network systems management principles, models, methods \\(e\\.g\\., end\\-to\\-end systems performance monitoring\\), and tools\\
Knowledge of Windows/Unix ports and services\\
Knowledge of general kill chain \\(e\\.g\\., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks\\)\\
Knowledge of systems security testing and evaluation methods\\
Knowledge of packet\\-level analysis using appropriate tools \\(e\\.g\\., Wireshark, tcpdump\\)\\
Knowledge of operating system command line/prompt\\
Knowledge of Intrusion Detection System \\(IDS\\)/Intrusion Prevention System \\(IPS\\) tools and applications\\
Bachelor\'s degree in Information Systems, related technical degree or equivalent experience
Minimum of three \\(3\\) years of experience in the field of information security
Must be available to work emergency restoration assignment as required\\
On\\-call and need to work off hours
Responsibilities
This position will act as the primary lead for proper handling of Information Security incidents and provide remediation actions as required\\
This position also monitors and audits information systems to confirm information security policy compliance and provides management with security policy compliance assessments and system monitoring reports\\
To accomplish these tasks must have an extensive understanding of digital investigations, and underlying principles of networking, infrastructure and system integration\\
In addition, provides technical expertise to key Security tools and software\\
Performs Incident Response functions for the SOC team to ensure incidents are handled appropriately to minimize risk and impact to the company\\
Analyzes and processes case work relating to computer security vulnerabilities, phishing, malware, and forensic investigations
Ability to anticipate and respond to changing priorities, and operate effectively in a dynamic demand\\-based environment, requiring extreme flexibility and responsiveness
Leads security incidents to ensure timely mitigation and remediation efforts are completed
Preserves, harvests, and processes electronic data according to company policies and regulatory requirements\\
Participates in forensic investigations as required, to include the collection, preservation of electronic evidence, analysis, and creation of a final report
Produces high quality oral and written work, presenting complex technical matters clearly and concisely with audiences ranging from peers to Sr\\
Evaluates, tests and selects security tools, evaluation products and control products\\
Assists with annual SOX, CIP and SOC assessment and related remediation efforts\\
Responding to emergency situations to meet customers\' needs is part of every employee\'s role\\
If employed, you will be given an Emergency Restoration assignment\\
This means you may be called to assist during an emergency outside of your normal responsibilities, work hours and location\\