Job Functions1. Cyber Incident Management2. Cybersecurity Operations3. Threat Hunting and Handling Methodologies4. Network Security Monitoring and System Administration5. Cyber Hygiene Techniques
Job Requirements1. 5+ years of directly relevant experience in cyber incident management or cybersecurity operations2. Familiarity with different operational threat environments (e.g., first generation [script kiddies], second generation [nonnation-state sponsored], and third generation [nation-state sponsored])3. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, crosssite scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)4. Excellent oral and written communication skills5. Familiarity with different operational threat environments (e.g., first generation [script kiddies], second generation [nonnation-state sponsored], and third generation [nation-state sponsored])6. Knowledge of system and application security threats and attack methods (e.g., buffer overflow, mobile code, crosssite scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)
Skills1. Knowledge of incident response, threat hunting, and handling methodologies2. Familiarity with different operational threat environments (e.g., first generation [script kiddies], second generation [nonnation-state sponsored], and third generation [nation-state sponsored])3. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, crosssite scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)4. Excellent oral and written communication skills5. Familiarity with different operational threat environments (e.g., first generation [script kiddies], second generation [nonnation-state sponsored], and third generation [nation-state sponsored])6. Knowledge of system and application security threats and attack methods (e.g., buffer overflow, mobile code, crosssite scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)1. Ability to track multiple active engagements, personnel or equipment deployments, as well as coordinate with internal and external stakeholders2. Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incidents3. Skill in recognizing threat actor campaigns, tactics, techniques, and procedures