Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Director, Information Security Jobs
Recruited by Muscular Dystrophy Association 8 months ago Address United States
Vp, Information Security Jobs
Recruited by LifeMD 8 months ago Address United States
Director Information Security Jobs
Recruited by ComplyAuto 8 months ago Address United States
Information Security Specialist Jobs
Recruited by Vertisystem 8 months ago Address United States
Information Security Intern Jobs
Recruited by Levi Technologies LLC 10 months ago Address United States
Cyber Security Interns Jobs
Recruited by Careful Security 10 months ago Address United States
Electronic Security Technicians Jobs
Recruited by Clear Connection Inc. 10 months ago Address Washington DC-Baltimore Area, United States
Sr Director, Cyber Security - 100% Remote
Recruited by Confidential 10 months ago Address Washington DC-Baltimore Area, United States
Cyber Security Instructor Jobs
Recruited by Nexus Infosec 1 year ago Address United States
Customer Success Manager - Electronic Security Saas - $9Mm In Funding
Recruited by RevsUp, a Recruitment Entrepreneur Company 1 year ago Address United States
Cyber Security Elearning Creator
Recruited by Pharmaceutical Company 1 year ago Address United States

Security Technician Jobs

Company

Majhi Group

Address United States
Employment type CONTRACTOR
Salary
Expires 2023-10-05
Posted at 8 months ago
Job Description

Candidates who are local to either Tampa, FL, or Jersey City, NJ


Job Summary:

You will be responsible for detecting, analyzing, and responding to cybersecurity events.As a technical lead, you lead detecting, investigating, and responding to cyber security events in the organization. You are a member of theCyber Security Incident ResponseTeam (CSIRT) and qualified to act as Incident Commander on serious incidents and, as a result, may be tasked with responding to cyber incidents outside of normal work hours. You are also responsible for leading certain programs and initiatives within the Cyber Blue Team as well as assisting in measuring and improving team performance and processes.


Expectations for the Cyber Blue Team Technical Lead:

  • Work with the Cyber Purple Team to implement content and tune security platforms.
  • Work with management and QA/QC lead to improve the overall performance of the team.
  • Independently lead technical programs and large projects.
  • Lead and coordinate major investigation s and incident response activities.
  • Monitor, Detect, Analyze, research, and respond to cyber security events including Network events, OS Log events and forensic information.
  • Occasionally travel to conferences, training, and other Client offices (up to 10%).
  • Act as Incident Commander for serious (P2-P4) incidents.
  • Participate in training, exercises, and process improvement program.
  • Collaborate with stakeholders from other business units to conduct investigations, review plans and procedures, and respond to cyber incidents.
  • Participate in on-call rotation and occasional after-hours work.
  • Act as an escalation point for junior team members.
  • Create messaging, socialize your program, and evangelize security at Client.
  • Train and mentor junior staff members.
  • Perform eDiscovery and other technical tasks.


To succeed in this role, you should:

  • Have previous experience successfully leading technical projects and complex incidents requiring collaboration with multiple people.
  • Demonstrate tactical leadership of teams to accomplish technical tasks and projects.
  • Demonstrate the ability to take minimal high-level requirements and independently produce and execute an action plan to accomplish tasks.
  • Demonstrate strong grasp of forensic interpretation of data
  • Demonstrate the ability to independently prioritize and manage multiple tasks.
  • Demonstrate the ability to produce written reports including detailed analysis and recommendations.
  • Have at least three (3) years previous experience as a SOC analyst or similar role.
  • Demonstrate the ability to convey complex technical concepts to both technical and non-technical audiences.
  • Demonstrate the ability to research and mentor team members on interpreting on OS log files, network logs, flow data and other security data
  • Be a subject matter expert in a particular technology or security domain as well as have hands-on experience and knowledge of modern security tools and DFIR best practices.
  • Demonstrate a strong desire to achieve and contribute to a high-performing team.