Below are 4 Open Roles: Please Review Thoroughly
5
Remote
Threat Intelligence Analyst
Role Description: The Threat Intelligence Analyst is responsible for identifying and assessing the capabilities and activities of cyber criminals or foreign intelligence entities.
Skills: Research skills, data analysis, familiarity with cybersecurity threats, strong written and oral communication, proficiency with threat intelligence platforms and security technologies, ability to use Azure Sentinel for threat intelligence.
Responsibilities: Gather and analyze data to understand threats, prepare reports and briefings on threat intelligence findings, support the security team in identifying and mitigating potential threats.
Qualifications: Minimum of 3 years of experience in a similar role, preferably in a financial or similar regulated sector. Proficiency in Python, PowerShell, or similar languages, and experience using Azure Sentinel.
Incident Response (IR) Analyst
Role Description: The IR Analyst is responsible for responding to cybersecurity incidents, mitigating their impact, and recovering systems and data.
Skills: Incident response, knowledge of common threats and vulnerabilities, digital forensics, proficiency with security technologies and incident response tools, ability to use Azure Sentinel for incident response.
Responsibilities: Respond to cybersecurity incidents, perform digital forensics, mitigate the impact of incidents, recover systems and data, prepare reports on incidents and responses.
Qualifications: Minimum of 3 years of experience in a similar role, preferably in a financial or similar regulated sector. Proficiency in Python, PowerShell, or similar languages, and experience using Azure Sentinel.
Security Operations Center (SOC) Analyst
Role Description: The SOC Analyst is responsible for monitoring and analyzing the organization's security posture on an ongoing basis.
Skills: Network security monitoring, data analysis, knowledge of common threats and vulnerabilities, proficiency with security technologies and monitoring tools, ability to use Azure Sentinel for security monitoring.
Responsibilities: Monitor the organization's networks for security incidents, analyze security data to identify threats, respond to security incidents, prepare reports on security monitoring findings.
Qualifications: Minimum of 5 years of experience in a similar role, preferably in a financial or similar regulated sector. Proficiency in Python, PowerShell, or similar languages, and experience using Azure Sentinel.
Red Teamer
Role Description: The Red Teamer is responsible for simulating cyber-attacks to identify vulnerabilities in the organization's security posture.
Skills: Ethical hacking, penetration testing, vulnerability assessment, knowledge of common threats and vulnerabilities, proficiency with security testing tools, ability to use Azure Sentinel for red teaming.
Responsibilities: Simulate cyber-attacks, identify vulnerabilities, report on findings, recommend mitigation strategies, assist with incident response.
Qualifications: Experience in a similar role, preferably in a financial or similar regulated sector. Proficiency in Python, PowerShell, or similar languages, and experience using Azure Sentinel. Specific years of experience is flexible, but a proven track record in ethical hacking or penetration testing is essential.