Listing Description
• Minimum of 5+ years of combined experience in incident response, forensics, penetration testing, SIEM monitoring, network analysis or other SOC-like operations
• Masters in Computer Science or Cyber Security; or equivalent experience
• Training in Incident Handling: GCIH or GCIA; or similar experience
• Effective communication skills including the ability to influence people and groups
• Ability to work within an on-call shift rotation
• Strong analytical skills
• Experience working at Internet scale
• Programming or scripting experience
• Training in attacker techniques: OSCP, GWAPT, GPEN, or similar experience
• Threat Modeling strategies (such as the Diamond Model)
• IOC management tools: CRITs, MISP, or similar experience
• EnCase, FTK, Remnux, Volatility, GRR, Rekall, or similar
• Full packet capture and analysis, preferably using Moloch
• EDR solutions (CrowdStrike, Mandiant/Fireeye, etc.)Detect and monitor adversaries
Digital Forensics & Incident Response (DFIR)
Develop cutting edge detection techniques and processes
Provide remediation guidance
Build, improve and test our detection capabilities
Identify people, process, and technology opportunities
Develop, propose and implement solutions
Provide feedback for longer term projects both internal and external to Paranoids
Work with other Paranoids’ teams to enhance our overall security posture
Guide the collection of additional data to support our hunting and analysis
Organize and participate in regular post-mortems to educate Paranoids and other business units
Search our massive datasets for indicators of compromised resources
Listing Details
- Salary: $150000 - $170000
- Citizenship: No Requirements
- Incentives: Both
- Education: No Requirements
- Travel: No Travel
- Telework: Optional Telecommute