Responsibilities:
Monitor security systems and networks for potential threats and vulnerabilities.
Respond to security incidents, conduct investigations, and perform root cause analysis.
Coordinate with other departments and external entities during incident response.
Maintain and update incident response plans and playbooks.
Stay up-to-date with the latest security trends, technologies, and threats.
Recommend and implement enhancements as needed to incident response procedures, tools, and controls.
Work with various stakeholders on the appropriate tactics to protect the organization.
Proactively work with partners and suppliers to achieve objectives on time and within budget.
Direct and/or take appropriate action with partners to build enterprise class solutions, respond to issues/threats, and communicate to stakeholders.
Actively engage in the greater Information Security and privacy community (e.g. peer groups, seminars, conferences, etc.) to help identify new technologies, new techniques and new partners.
Key Qualifications:
5+ years of relevant experience is required.
3+ years of experience working in incident response roles.
Bachelor’s degree in Computer Science, Management Information Systems, Information Security or equivalent is required.
Cybersecurity certifications (e.g. CISSP, GIAC certifications, etc.) are preferred.
Experience working with CIS Critical Controls, NIST CSF and ISO 27001 frameworks are preferred.
Technical Skills and Abilities
Strong interpersonal, written, and verbal communication skills
Demonstrated experience working with a team to solve technical problems.
Ability to focus on and achieving results.
Demonstrated reliability and follow through on commitments and assignments.
Demonstrate professionalism and courtesy in all interactions.
Demonstrated ability to implement security best practices.
Work well under pressure (i.e., a critical system is down)
Able to work independently and as part of a team.
Working knowledge of scripting (PowerShell, Python, Perl, etc.)
Working knowledge of core network and systems administrator protocols
Working knowledge of network solutions/technologies
Experience working with Security Information and E.vent Management (SIEM) and Security Orchestration and Automation Response (SOAR) platforms.
Experience with EDR solutions.
Ability to analyze and interpret security logs and data.
Experience with and ability to implement security best practices.
Experience with security tools (vulnerability scanners, sniffers, log correlation tools)
Experience with Windows, Linux, and Mac operating systems
This role is based in our Columbus, OH or Washington, D.C. office. A reasonable rate of compensation for this position is between $90,000-$100,000 per year.