Cybersecurity Incident and Application Analyst

August 10

Apply Now
Logo of Hunter Strategy

Hunter Strategy

Get IT right.

Software Engineering • Information Security/Cyber Security • Enterprise Architecture • Cloud Engineering • Agile

51 - 200

Description

• Hunter Strategy has a unique philosophy to technical project delivery. • We treat all our customers like mission partners because they rely on our team to meet their objectives through complex software engineering, cloud operations, and cyber risk management solutions.

Requirements

• Minimum of 2-5 Years • Desired certifications - E|CIH - OSCP - GCIH - Splunk • Experience in Network Security, Web Application Security, and cloud technologies • Good knowledge of all the Ports and Protocols. • Experience in identifying the default/weak configurations, vulnerable ports, and insecure protocols. • Deep understanding of computer intrusion activities, incident response techniques, tools, and procedures. • Experience with the Enterprise Incident Response Cycle: Preparation, Detection & Analysis, Containment and Recovery, Post Incident Analysis. • Good knowledge of NIST SP 800-61 and working knowledge in creating RACI charts. • Experience in identifying Malicious/Suspicious activities and assigning them appropriate criticality. • Experience in escalation procedures. • Ability to create lessons learnt from the incident and evaluate the effectiveness of IRP and improvise the procedures and SOPs accordingly. • Ability to assist in the yearly IR tests. • Experience in FireEye technologies, IDS/IPS technologies (Palo Alto), SIEM (Splunk), Vulnerability detection tools like Tenable. • Good understanding of Operating systems like Windows and Linux. • Ability to produce reports for management and executive teams to review.

Apply Now

Similar Jobs

August 7

QGenda

501 - 1000

Ensure high security across product lines for healthcare workforce management technology.

July 28

Cloudflare

1001 - 5000

Own Email Security’s detections and managed services to safeguard organizations from email threats.

Built by Lior Neu-ner. I'd love to hear your feedback — Get in touch via DM or lior@remoterocketship.com