Experience with SIEM platforms, Threat hunting and malware reverse engineering, Knowledge of public cloud environments (AWS, Azure), Experience in network security protocols and tools, Certifications in cybersecurity preferred.
Key responsabilities:
Administer and optimize SIEM systems
Participate in complex network threat investigations
Monitor and configure endpoint protection solutions
Provide technical support and incident response
Collaborate in a high-demand environment
Report This Job
Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
Pro5 (formerly Mangtas) is an AI platform, specialized in finding and hiring the top 5% of remote professionals from cost-effective markets for roles like software developers, sales reps, and customer service experts.
Our proprietary AI bot automatically sources, tests, interviews, structures 500+ data points and matches only the best-fit talents to job descriptions – all based on objective & real-world capabilities, unlike traditional methods which rely on CV key words & theoretical tests. This has proven to shorten the hiring process from months to days.
Get in touch with us for your remote staffing needs today!
SIEM administration, configuration, and optimization experience with platforms such as Alien Vault, IBM QRadar, ArcSight or LogRhythm
Threat hunting experience
Malware reverse engineering and outbreak management experience
Experience participating in and acting as an escalation point for complex network threat investigations
Linux command line experience
Experience and knowledge of public cloud environments, specifically AWS and Azure
Knowledge of regular expressions and data normalization
Experience configuring, integrating, and monitoring endpoint protection solutions such as Cylance, Carbon Black, or CrowdStrike
Understanding of network protocols coupled with experience with web proxies, web application firewalls, and vulnerability assessment tools.
Experience working in a team-oriented, collaborative environment with a high level of analytical and problem-solving abilities
Positive attitude with strong oral and written communication skills
Knowledge of IP networking and network security including Intrusion Detection
Familiarity with common network vulnerability/penetration testing tools
Familiarity with service management software such as ServiceNow
Familiarity with data visualization platforms such as Domo
Some experience with system hardening guidance and tools
Experience on an incident response team performing Tier I/II initial incident triage, desired
Experience supporting clients and serving as a technical advisor
Ability to anticipate and respond to changing priorities and operate effectively in a dynamic demand-based environment requiring flexibility and responsiveness to client matters and needs
Certifications or work toward any of the following is strongly desired:
GIAC Certified Incident Handler (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Forensic Examiner (GCFE)
GIAC Network Forensic Analyst (GNFA)
Cisco Certified Network Associate (CCNA)
Required profile
Experience
Level of experience:Mid-level (2-5 years)
Industry :
Human Resources, Staffing & Recruiting
Spoken language(s):
English
Check out the description to know which languages are mandatory.