$80K — $100K *
This position requires strong analytic and written communications skills, such as those that would be required to enable non-technical business managers to make informed, risk-based decisions related to incident containment and remediation.
This position should have a deep understanding and experience with network protocol analysis, symmetric cryptography, public key infrastructure, SSL, information security analytics, Microsoft Windows and Active Directory, Linux, open source software, scripting, SQL, and software programming.
This individual should also act decisively and exhibit strong decision making skills and other interpersonal skills, enabling them to work well with those around them.
Responsible for analyzing, documenting and responding to security events, and performing incident response. This role will act as an escalation point from the managed service provider (Tier 1 SOC) for events that require further analysis and treatment. Will work closely with Security team and the Carlyle team at large in the resolution/containment of security incidents. Will maintain the security incident response playbook. Will tag and annotate assets and IOCs in internal security tools. Develops methods and analytics for detecting advanced threats. Performs routine hunting exercises.
Responsible for supporting information security systems. Related tasking includes, among others, documentation, updating software, deploying new technologies, performing backups, scripting, submitting change requests, quality assurance testing, developing reports, and systems troubleshooting.
Provide reporting around project deliverables.
Responsible for improving relevant knowledge, skills, and abilities through research, lab work, mentoring others, training, and other professional development activities. Monitor threat intelligence reports.
Education & Certificates
Valid through: 11/11/2021