Required Education:
Bachelor's Degree in Information Technology, Computer Science, or a related field.
Preferred Education:
Master's Degree in a related discipline
Required Experience:
3+ years in a dedicated cybersecurity role including a focus on vulnerability management, security operations, or a related field, or an equivalent combination of education and experience. and 3+ years Proven background in vulnerability management, including hands-on experience with vulnerability scanning tools, security tool administration, and platforms. Experience includes creating and maintaining documentation, writing searches in a logging platform or SIEM, and evaluating risk exception requests to determine if compensating controls have lowered risk to an acceptable level. Experience with automation tools using scripting, SOAR tools, or Splunk.
Preferred Experience:
5+ years Experience working in a large-scale information technology environment. Working knowledge of network and system diagnostic tools. Experience securing cloud computing environments. Experience with scripting, programming, or automation methods. Strong background with vulnerability and patch management tools and methodologies. and 3+ years Experience with Splunk SPL and Splunk Dashboard Studio, Internet of Things search engines (e.g. Censys, Shodan), scanning a large enterprise environment with enterprise and open source tools, Web Application, DAST, and SAST security tools.
Required Skills, Knowledge and Abilities:
• CompTIA Security+ • Strong verbal and written communication skills • Knowledge of types of vulnerabilities • Knowledge of core concepts in: ◦ Operating Systems ◦ Networking services, ports, and protocols ◦ Web applications (OWASP Top 10, HTTP methods, REST APIs) ◦ Infrastructure (e.g., VPN, NAT, Load Balancer, WAF, types of servers) • Knowledge of system administration (including troubleshooting) • Knowledge of vulnerability prioritization techniques • Knowledge of endpoint management/patch management tools • Knowledge of commonly abused services, misconfigurations, and vulnerabilities • Proven ability to conduct threat research based on emerging threats and/or vulnerabilities and hunt for impacted assets • Proven ability to onboard and scan new data sources • Knowledge of advanced security controls and information security best practices. • Familiarity with security & compliance frameworks such as CIS, NIST, ISO, and PCI-DS
Preferred Skills, Knowledge and Abilities:
• Knowledge of APIs, containers, cloud architecture, and application security principles • Awareness of Attack Surface Management techniques • Knowledge of common misconfigurations within cloud environments