Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailTrace Systems is seeking a dynamic Cyber Defense Specialist to join our team in support of the AFCENT Combined Air Operations Center (CAOC) contract at Doha, Qatar. This role offers the opportunity to management, administration and implementation of cybersecurity Mission Defense programs to ensure confidentiality, availability, and integrity of Enterprise and AOC networks, systems and information. If you're ready to make a significant impact and thrive in a mission-critical environment, this opportunity is for you!
The job responsibilities include, but are not limited to
Threat Intelligence and Monitoring:
Continuously monitor network traffic, logs, and system activities for signs of security breaches, intrusions, or anomalies using security monitoring tools (e.g., SIEM systems like Splunk, ArcSight).
Stay updated on the latest cybersecurity threats, attack techniques, and vulnerabilities to proactively defend against emerging risks.
Collect, analyze, and share threat intelligence from internal and external sources to understand potential threats and assess their impact on the organization.
Leverage threat intelligence platforms (TIPs) and security tools to identify and block malicious activities, suspicious patterns, and attacks.
Incident Response and Mitigation:
Respond to security incidents such as unauthorized access attempts, data breaches, malware infections, and denial-of-service (DoS) attacks.
Investigate and analyze security incidents to determine the root cause, scope, and impact of the attack.
Work with internal teams to contain, mitigate, and recover from security incidents while minimizing damage and downtime.
Follow established incident response protocols and document actions taken during an incident for later review, analysis, and reporting.
. Vulnerability Assessment and Management:
Perform regular vulnerability assessments and penetration testing to identify weaknesses in the organization's network, systems, and applications.
Use automated vulnerability scanning tools (e.g., Nessus, OpenVAS) and manual techniques to identify and prioritize vulnerabilities that could be exploited by attackers.
Work with IT teams to patch vulnerabilities, upgrade software, and apply security configurations to strengthen the organization’s defense.
Ensure timely resolution of security weaknesses and misconfigurations.
Full-time