Overview : Cyber Security Operation Expert is the primary defense component when a Security incident is confirmed with overall responsibility for defining and executing the Incident Response lifecycle and remediation activities as a part of Incident Handling.
will present the incident report to involved parties and will write and distribute Lessons Learned technical articles for knowledge sharing.
The Cyber Security Operation Expert will have engineering responsibilities : to define and implement advanced solutions that answer to security and cyber-
security threats; to extend Security Operations Center activity to areas not yet covered.The candidate should possess deep knowledge in : OS LinuxIntegrated security architectures, technologies and security methodsMalware analysis, vast experience with cyber security threatsVast experience with security high end technologiesExperienced with analysis and incident responseSIEM operations and administrationPenetration tests, Ethical hackingScripting and programming skills (e.
performs the follow-up to implement the recommendationsAssesses Cyber Security risks and analyze potential mitigation strategies to reduce the exposure (Use Cases, Scenarios)Detailed analyses of various security event sources (FW, IDS, PROXY, AD etc.
Acts as the interface with other IT / Network and business departments regarding Cyber Security incidentsPerform on call activityProvide support to L1 analysts inside Security Operations CenterCarries out studies and research on intrusion detection methodsParticipate in the implementation and improvement of the specific tolls associated to Security Operations Center ecosystemInvestigates, proposes and develops automated methods for detection and malware analysisParticipate in the implementation and development of specific business security models, acting as a security adviser.
Defines preventive actions and needed operations, as a leader of security improvements activitiesKeeping up to date with industry trends and technologyPerforms and presents security audits, specific IT penetration tests, vulnerabilities exploitationThank you!