https://bayt.page.link/ZjtRVVMXoY1FPHPP7
Create a job alert for similar positions

Job Description

Over the last 20 years, Ares’ success has been driven by our people and our culture. Today, our team is guided by our core values – Collaborative, Responsible, Entrepreneurial, Self-Aware, Trustworthy – and our purpose to be a catalyst for shared prosperity and a better future. Through our recruitment, career development and employee-focused programming, we are committed to fostering a welcoming and inclusive work environment where high-performance talent of diverse backgrounds, experiences, and perspectives can build careers within this exciting and growing industry.

Job Description


DETAILED RESPONSIBILITIES/DUTIES:
 Develop and maintain security analyst metrics for effective measurement of operations volumes
 Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
 Support critical, sensitive incidents spanning multiple geographies  Day-to-day operational tasks related to the ongoing support of Cyber Operations.  Responsible for documenting the incident life cycle, conducting handoffs’, escalation, and providing support during cyber incidents  Responsible for the tracking and assignment of tickets/events to Cyber Security Team.  Responsible for analyzing potential threats from multiple sources.  Responsible for creating filters, reports, dashboards, and alerts in support of Cyber Operations.
ARES Job Description – Level 2 Cybersecurity Operations Engineer 7/31/2019
2
 Responsible for initiating blocks for all indicators of compromise gathered in analysis.  Responsible for creating and updating existing playbooks and runbooks.
 Collaborate and support various internal technology teams and service providers on security related issues and provide guidance and recommendations as necessary.
 Assist with real-time security incident handling and tracking (e.g., intrusion correlation/tracking, threat analysis, and direct system remediation) tasks to support Incident Response Team.
SUPERVISORY RESPONSIBILITIES:
None
REQUIRED QUALIFICATIONS:
Skills:
 Demonstrated experience in leading initiatives across regional operations, information protection, risk assessments (technical/network related), incident response and cyber investigations
 Strong knowledge of networking fundamentals such as TCP/IP and basic packet analysis
 Experience with Networking and operation tools (i.e. – Log management, Firewall management, SIEM, etc…)
 Ability in conducting network security assessments such as creating and maintaining detailed project plans, scope of work, and other technical documentation as required
 Strong experience with cyber security in the domains of cyber threat intelligence and analysis, security monitoring and incident response
 Experience of network and system vulnerabilities, malware, networking protocols and attack methods to exploit vulnerabilities
 Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies
 Knowledge of incident response and handling methodologies
 Thorough understanding and application of security concepts, protocols and methodologies across multiple operating environments
 Excellent verbal and written communication skills with a wide range of audiences including technologists, business stakeholders and IT team members
 Experience in working with and being a part of matrix teams
 High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
Experience:
 Minimum 5-6 years of demonstrated experience in Technology/IT industry  Security Operations Center experience preferred.
 3-5 years of experience in a cybersecurity discipline
Education:
 Bachelor’s degree in Computer Science, Information Technology, Business or equivalent discipline
 Professional Certifications will be plus
ARES Job Description – Level 2 Cybersecurity Operations Engineer 7/31/2019
3
PREFERRED QUALIFICATIONS:
 Knowledge of security incident and event management, log analysis, network traffic analysis, malware investigation/remediation, SIEM correlation logic and alert generation  Understanding of Security principles, techniques and technologies such as SANS Top 20 Critical Security Controls  Moderate knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)  Moderate knowledge of security related technologies and their functions (IDS, IPS, EDR, IRP, FW, WAF, SIEM, etc.)  Professional Certification like: Certified Incident Handler (GCIH), Certified Intrusion Analyst (GIAC), Certified Ethical hacker (CEH), Certified Incident Handler (CIH)


Reporting Relationships


Chief Technology Officer, President, AOISSC

Qualifications


If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!









You have reached your limit of 15 Job Alerts. To create a new Job Alert, delete one of your existing Job Alerts first.
Similar jobs alert created successfully. You can manage alerts in settings.
Similar jobs alert disabled successfully. You can manage alerts in settings.