Job Description
· Certified experience in Enterprise Managed Security Services focused on Incident response activities
· Strong knowledge of tools used for network security
· Understanding of basic attack and defense techniques
· Develop and follow detailed operational processes and procedures
· Analyze, escalate and assist in the remediation of information security incidents.
· Prioritize multiple tasks and formulate responses/recommendations to customers.
· Provide assistance to other incident response teams.
· Apply technical acumen and analytical capabilities to speed and enhance response.
· Capable of following an investigative process
· Strong Operating System understanding (Linux & Windows)
· High level understanding of malware identification/remediation processes
· Ability to document and explain technical details in a concise, understandable manner
· Ability to read and understand diverse log sources quickly
· Research and document threats and their behavior.
· Good understanding of incident response & forensics tools including redline, volatility, FTK, Encase, Photorec, Bulk extractor, etc.
· Good understanding of Packet analysis tools (tcpdump, Wireshark, ngrep, etc.)
· Working knowledge with tools such as: Web App Tools Intercepting proxies (e.g. Burp Proxy, Paros Proxy, etc.) and automated scanners (e.g. Nessus, Acunetix, WebInspect, Netsparker, nikto, Skipfish)
· Working knowledge with Exploitation Tools - Metasploit, Karmetasploit, BurpSuite, BackTrack/Kali Linux, SQLMap, Social Engineering Toolkit
Skills
- Bachelor degree in computer science, computer engineering, or software engineering