Job Summary:
1. The role involves detecting and responding to cyber threats and ensuring the security and resilience of infrastructure and data.
2. The tasks include incident monitoring and detection incident response threat intelligence and analysis.
3. The job requires tool management and optimization collaboration and communication reporting and documentation and penetration testing.
4. The candidate should have a minimum of 35 years of experience in a Security Operations Center (SOC) or a similar cybersecurity role.
5. Demonstrated experience in incident detection incident response threat intelligence and penetration testing is required.
6. The candidate should have indepth knowledge of Security Information and Event Management (SIEM) experience with security monitoring tools and technologies and proficient understanding of networking concepts protocols and technologies.
7. Proficiency in penetration testing tools and methodologies familiarity with operating systems security for both Windows and Linux environments and experience in conducting threat hunting activities are also required.
8. The candidate should have a solid understanding of the incident response lifecycle and knowledge in scripting and automation.
9. A bachelors or masters degree in computer science or a related discipline is required.
10. Relevant cybersecurity certifications such as Certified Ethical Hacker (CEH) GIAC Penetration Tester (GPEN) Offensive Security Certified Professional (OSCP) or other related certifications are highly desirable.
11. The candidate should have handson experience on Security Information and Event Management (SIEM) Endpoint Detection and Response (EDR) Vulnerability Management Penetration Testing Threat Intelligence Incident Response Log Analysis and Correlation Scripting and Automation.
12. Familiarity with Security Frameworks and Compliance like ISO27001 NIST MITR ATT&CK is also required.