Details:
- Solid (hands on, not theoretical only) Threat & Incident Response Analyst (experience with Azure and GCP is highly desired, but not mandatory)
- Includes strong troubleshooting and root cause analyses skills
- Programming/Scripting skills
- Network and host forensics
- Malware analyses and memory analyses
would like to see the candidates at the SANS GCFA level (Certified Forensic Analyst) with practical experience.
Technical Skills
- Information Security tools & packet analyses tools (e.g. CB, Wireshark)
- Intrusion Detection (e.g. IDS/IPS tools)
- Firewall (e.g. Pato Alto Networks)
- Security Information and Event Management (SIEM) Splunk is preferred
- Strong Windows and Linux administration experience
- Programming/Scripting tools (e.g. Python, Bash)
- Internet Protocols and Services (e.g. TCP/IP, FTP, HTTPS, SSH)
- Networking infrastructure (Cisco is preferred)
- Vulnerability Testing tools (e.g. Nessus, Kali)
- Network scanning tools (e.g. NMAP)
- Awareness of SCADA / IIoT technologies
- Log analysis/ Windows event analysis
- Network and Host forensics
- Malware analysis and memory analysis
- Antivirus solutions, virus outbreak management and the ability to differentiate virus activity from directed attack patterns
- SharePoint and PowerBI experience is an advantage
- Strong troubleshooting and root cause analyses skills
by via developer jobs - Stack Overflow
No comments:
Post a Comment