such as Imperva, F5, or Cloudflare. In-depth understanding of security principles, protocols, and technologies (e.g., SSL/TLS, OWASP Top Ten, DDoS mitigation). Experience with security monitoring and incident response tools. Relevant security certifications (e.g., CISSP, CEH, GIAC) are highly desirable. Excellent problem-solving skills and more »
PCAP analysis Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement. Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise. Ability to demonstrate the more »
PCAP analysis Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement. Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise. Ability to demonstrate the more »