CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerability management tools * Malwarereverseengineering * Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working experience in a live SOC environment * Line more »
verify threat hypotheses Proactively and iteratively search through systems and networks to detect advanced threats Analyze host, network, and application logs in addition to malware and code Prepare and report risk analysis and threat findings to appropriate stakeholders Lead cyber threat hunt missions with minimal supervision or guidance and … The candidate should have at minimum ONE of the following certifications: Certified Information System Security Professional (CISSP). SANS - GCIA - Intrusion Analyst SANS - GREM - ReverseEngineeringMalware SANS - GISF - Security Fundamentals SANS - GXPN - Exploit Researcher and Advanced Penetration Tester SANS - GMON - Continuous Monitoring Certification OSCP (Certified Professional more »
The candidate should have at minimum ONE of the following certifications: Certified Information System Security Professional (CISSP). SANS - GCIA - Intrusion Analyst SANS - GREM - ReverseEngineeringMalware SANS - GISF - Security Fundamentals SANS - GXPN - Exploit Researcher and Advanced Penetration Tester SANS - GMON - Continuous Monitoring Certification OSCP (Certified Professional more »