Years of experience required per function below:
| 8 | Required | Experience working in Cybersecurity space
| 6 | Required | Experience with Data Loss Protection/Cloud Access Security Brokers (i.e. Symantec, Microsoft, Bitglass, Netskope)
| 5 | Required | Experience with Vulnerability Management Systems (i.e. Rapid7, Tenable/Nessus Scanning, Qualys). Establish vulnerability management program using systematic scanning, risk evaluation, and coordination to remediate or mitigate identified vulnerabilities
| 5 | Required | Experience with Endpoint Detection and Response (i.e. EndGame, Crowdstrike, CyberReason). Detect and respond to alerts from end point detection response tools
| 5 | Required | Experience prioritizing top threats and likelihood for data loss vectors
| 5 | Required | Experience developing API use cases, scenarios, requirements in support of integrations with other platforms
| 5 | Required | Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and lead and work as part of a team
| 5 | Required | Research and analytical background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
| 5 | Required | Ensure proper metrics, analysis, and reporting for continuous process improvement. Provide escalation support and document resolutions for improvement.
| 5 | Required | Monitor external data sources (e.g., cyber defense vendor sites, US-CERT, OpDivs, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine issues that would impact the enterprise
| 5 | Required | Experience in creating, documenting, and maintaining policies, procedures, and workflows
| 4 | Required | Graduation from an accredited four-year college or university with major coursework in information technology security, computer information systems, computer science, management information systems, or a related field. Master’s Degree a plus
| 1 | Required | CISSP, CCSP, CEH, or equivalent certifications
| 7 | Preferred | Research and analytical background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis.
| 7 | Preferred | Possess a solid understanding of application security standards, frameworks, attack methods, and mitigation best practices (e.g., OWASP, SANS, NIST, PCI DSS, HIPAA, CIS Critical Controls)
| 5 | Preferred | Experience with Email Threat Management (i.e. Proofpoint, MimeCast, Microsoft)
| 5 | Preferred | Experience with Cloud Enterprise Network Security (i.e. Cisco Umbrella, Palo Alto, ZScaler)
| 5 | Preferred | Experience with SIEM engineering design/management/analysts (i.e. Splunk, Rapid7, SumoLogic)
| 5 | Preferred | Running and handling the Incident Response Team (IRT) and procedures in the SOC Division
| 5 | Preferred | Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks
| 3 | Preferred | Understanding of cloud based solutions such as AWS, Azure, and/or Google Cloud
| 3 | Preferred | Experience in performing the forensics by using the toolkit FTK / Autopsy etc.
| 1 | Preferred | OSCP, CISM, GSEC, CEH, CISA, CCSP, CNFE desired
| 1 | Preferred | Symantec Certified Specialist (CloudSOC, DLP); Microsoft 365 Certified: Security Administrator Associate
this requirement is insane. You need sever people to take care of this many functions..