A highly skilled and driven cybersecurity analyst specializing in vulnerability management, SOC escalations, cyber incident response, and endpoint protection. Proficient in using advanced tools like SentinelOne and CrowdStrike. Strong background in networking, infrastructure security, and implementing the NIST Cybersecurity Framework (CSF) for overall security posture enhancement. The ideal candidate can take full ownership of the vulnerability management lifecycle, investigate complex cyber threats, and ensure seamless security operations.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Responsibilities:
- Lead the vulnerability scanning and remediation program. Conduct regular scans using tools like Qualys, Nessus, or Rapid7 and ensure timely patch management.
- Work closely with the infrastructure and development teams to address critical vulnerabilities in a risk-based manner.
- Serve as the primary point of contact for SOC escalations and conduct detailed analysis of escalated alerts, ensuring quick containment and mitigation.
- Use threat intelligence to refine detection mechanisms and optimize SOC monitoring.
- Coordinate and lead the full lifecycle of incident response, including identification, containment, eradication, recovery, and post-incident reporting.
- Utilize EDR tools like SentinelOne, CrowdStrike, or Carbon Black to detect, isolate, and resolve malicious activities on endpoints. Document incidents for continuous improvement of playbooks and incident response protocols.
- Align cybersecurity operations with NIST Cybersecurity Framework standards. Assist in the preparation and execution of risk assessments and vulnerability tests to maintain compliance with industry standards and regulations.
- Ensure strong security architecture across network infrastructure, including firewall management, intrusion detection/prevention systems (IDS/IPS), and VPNs.
Knowledge, Skills, and Abilities:
- Endpoint Detection & Response (EDR): Expertise with SentinelOne, CrowdStrike, Carbon Black, or similar tools to detect and respond to endpoint threats.
- Vulnerability Management: Proficiency with Qualys, Nessus, Rapid7, or other vulnerability management platforms for assessing and prioritizing security gaps.
- Network Security: Knowledge of TCP/IP, DNS, VPNs, VLANs, IDS/IPS, and firewall configurations.
- SIEM Solutions: Experience with Security Information and Event Management (SIEM) systems such as Splunk, LogRhythm, or QRadar for threat hunting and log analysis.
- Threat Intelligence: Familiarity with using threat intelligence platforms to enhance detection and response strategies.
- Security Frameworks: Working knowledge of PCI DSS and NIST Cybersecurity Framework (CSF), ISO 27001, or other relevant frameworks for ensuring compliance and risk management.
EDUCATION AND REQUIREMENTS
- Certified Ethical Hacker (CEH): Validates knowledge in ethical hacking techniques and securing systems from threats.
- GIAC Certified Incident Handler (GCIH): Demonstrates skills in incident handling and response, particularly useful for investigating and resolving cyber incidents.
- GIAC Certified Detection Analyst (GCDA): Focuses on security monitoring and incident detection, especially with SIEM and threat-hunting solutions.
- CompTIA Cybersecurity Analyst (CySA+): Practical certification that covers advanced threat detection and analysis, focusing on vulnerability management and incident response.
- CompTIA Security+: Entry-level but essential for a foundational understanding of cybersecurity concepts and practices.
- Certified Threat Intelligence Analyst (CTIA): Highlights proficiency in handling threat intelligence, correlating data for incident response, and improving SOC operations.
Required:
- Minimum 3-4 years of Information Security job experience
- Knowledge point of sale environments and cloud computing AWS, Azure, GCP
TRAVEL
- Up to 10% travel may be required
PHYSICAL REQUIREMENTS
- Prolonged periods sitting/standing at a desk and working on a computer
- Must be able to lift up to 50 pounds
Parker’s Companies is an equal opportunity employer committed to hiring a diverse workforce and sustaining an inclusive culture. Parker’s does not discriminate on the basis of disability, veteran status or any other basis protected under federal, state, or local laws.