Detects, identifies, and responds to cyber events, threats, security risks, and vulnerabilities in line with cyber security policies and procedures
When necessary, lead and coordinate incident response investigators and stakeholders, and security operations center team to effectively investigate and neutralize a security incident
Communicates with stakeholders and leadership to provide timely and accurate updates on the progress of the response effort
Mentors and leads junior team members by example and through effective communication via one on one meetings, coaching, informative instructions, or other methods as required
Completes projects on time, according to instruction, and within requirements described by stakeholders
Identifies, documents, and blocks TTPs, IOCs, and other artifacts during incident response
Authors content using query languages and scripting for event enrichment and efficient investigation
Develops procedures and documentation to support incident response and forensic investigation standard operating procedures
Contributes to the maintenance and optimization of the organization’s incident response plan
Creates detailed timelines and incident post mortem documentation following investigations
Conducts threat hunting and analysis using various toolsets based on intelligence gathered
Partner with the security engineering and platform engineering teams to optimize operations
Support a program for continuous security controls testing and validation
Perform other duties as planned and communicated by leadership
Bachelor’s degree or equivalent relevant work experience in Computer Science, Information Technology, Business, Intelligence, or Security Operations
Professional Certifications such as CISSP, CISM, CEH, GCIH, GCIA, GSOC a plus, but are not required
4+ years of experience in Cybersecurity, or with a reputed Services / consulting firm offering security operations consulting or equivalent experience
Demonstrated proficiency in IR and forensic response using a variety of toolsets
Experience in scripting languages such as PowerShell or Python
Experience in SOAR (Security Orchestration Automation Response) platform preferred
Experience with one or more Security Information and Event Management (SIEM) solutions
Experience as a leader, mentor, and trainer of team members
Experience should demonstrate a sharp security mindset, initiative to solve problems, and teamwork
Elevated level of personal integrity, honesty, and character
Able to professionally handle confidential matters and show an appropriate level of judgment and maturity
Strong understanding of IR, forensic investigation, and defensive security
Keen sense of ownership, accountability, curiosity, and independent thinking
Comfort in dealing with ambiguity, stress, and uncertainty in a dynamic environment
Well-developed analytic, critical thinking skills and demonstrated problem-solving abilities and decision-making skills.
Experience in security monitoring, Incident Response (IR), and security tools configuration and tuning
Knowledge of cyber security frameworks and attack methodologies
Experience with EDR, email defense, and other security operations tools
Inquisitive and committed to continual improvement/learning
Ability to be flexible in terms of hours to coordinate effectively with team members across time zones
Excellent communication (written, verbal, presentation, documentation) and client service skills
Capable of interacting and coordinating with stakeholders to drive project/task/support engagement
Ability to interact effectively at all levels with sensitivity to cultural diversity