SUPERVISORY RESPONSIBILITIES:
Supervise assigned employees by organizing and monitoring work progress
Maintain staff by recruiting, selecting, orienting, and training employees
Manage performance of employees through development, coaching, and counseling
Top 3 skills/ How are they applied:
SIEM: They will be the primary Admin for our SIEM and related tools, so they will need the following:
· Extensive experience deploying, configuring, and administering an enterprise-class SIEM
· Rapid7 insightIDR heavily preferred
Vulnerability Management: They will be the primary Admin for our Vulnerability Management and related tools, so they will need the following:
· Extensive experience deploying, configuring, and administering an enterprise-class Vulnerability Management solution
· Experience working within a formal Vulnerability Management Program
· Rapid7 insightVM heavily preferred
· Experience working with, implementing, and auditing CIS Benchmarks; FEDRAMP and FFIEC compliance policies a bonus
Incident Response: They will be a vital Incident Response Team member and the first POC for Cyber to review Events to determine if they meet the guidelines for an Incident.
· Experience working as part of an Incident Response Team, ideally having been part of an incident
· Experience conducting Tabletop Exercises
QUALIFICATIONS:
Bachelor’s Degree from a 4-year accredited institution and a minimum of 4 years of related experience required; or 8 years of Information Security experience required
4 years of Cybersecurity Engineering or Architecting experience required
Cybersecurity-related certifications such as Certified Information Security Professional (CISSP), GIAC Defensible Security Architecture (GDSA), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC Certified Forensic Examiner (GCFE), and Offensive Security Certified Professional (OSCP)
Experience and solid working knowledge of cybersecurity and network analysis tools, network topologies, intrusion detection methodologies, Windows systems, and preferably Linux systems analysis for evidence of compromise
Familiarity with the requirements of NIST SP 800-53, FFIEC Booklets, and Critical Security Controls