Job Description :
remote for now later an onsite role

5 years’ experience within network forensic analysis, including analysis of log data and network devices in support of intrusion analysis or information security operations.

Minimum of 3 years’ experience with Perl, Python, or other scripting language in an incident handling environment

Familiar with aspects of InfoSec from a technical perspective

Controls such as Sentinal, PaloAlto, (new Sim), firewalls, application firewalls, web filtering

Incident response will be daily duties: correlate information, put together security events.

Users logging in from one point to another, security issues, breaches

O365 (ATP, Defender) Azure skillset would be great

CloudStrike (+), EDR

Bachelor’s degree in computer science or workforce equivalent Technical certifications preferred.
OSCP Certification is desired for this position.
Additional certifications such as CISSP, GPEN, GCIH and GCFA or other Security disciplines desired.