We need at least:
- Bachelor's degree in computer science or equivalent cyber related field
- 6 years of hands-on IT security work.
- Advanced knowledge of vulnerability analysis, exploitation techniques and incident management
- The ability to appreciate a complex, technical environment
- Looking for a technical master who also has over-arching ideas on processes, procedures, and standards.
- Be a contributing member of the technical CSIRT
- Investigate intrusion attempts and perform in-depth analysis of exploits
- Independently follow procedures to contain, analyze, and eradicate malicious activity
- Improve overall SOC functions
- Configure security tools and sensors to alert on certain risk conditions
- Examine cyber adversary techniques in order to develop defensive methodologies
- Assist with the development, testing, and implementation of new controls including: IDS/IPS, encryption, email/web proxies, endpoint controls, etc.
- Act as a technical leader and mentor junior analysts
- Help develop standards, best practices, and help to design/execute new solutions for security problems.
- we need someone who knows how general networking protocols work
- we need someone who knows how windows works and would be willing to learn how Linux works as we are moving to more of a Red Hat shop
- we need to fill some of our skills gaps (like Cisco router/switch/ASA firewall)
- but also someone who has experience implementing, troubleshooting, and supporting security tools like email/web proxy, anti-virus, DLP, etc
1. Need Strong experience with : TCP/IP, subnetting, BGP, EIGRP, NAT, switching, ARP, DNS, DHCP. This is what we would like to see.
2. Development heavy are all of the programming skills like .NET, Ruby, Python, C++, VB, etc. While I imagine that we will develop our Development Security program in the future, we currently outsource all code reviews. Our candidates seem to be too focused on development and not enough on networking.