The individual should have an investigative mindset that allows them to think out of the box as to why events are occurring and provide a rapid, but accurate, response to the emerging threats and trends.
Experience in the operation and theory behind Intrusion Detection Systems, and familiarity with Sourcefire (Snort rules apply), SIEM Technologies, Enterprise Security Tools, web gateway management, centralized log analysis, PCAP, and AntiVirus.
Provide technical design, development and maintenance of databases and associated master files for accessibility, security and integrity of company data. Perform logical data modeling, physical database design, programming and implementation.
The individual will need to be able to document and communicate effectively with customers and internal teams, assist in the investigation of events and follow-up with corrective actions and reporting.