Qualifications and Skills:Bachelor's degree in computer science, Information Security, or related field3-5 years of experience in a cybersecurity role with progressively increasing responsibilitiesStrong understanding of cybersecurity principles, threat landscape, and attack methodologiesProficiency in security tools and technologies such as SIEM, EDR, IDS/IPS, firewalls, and vulnerability scannersExcellent analytical, problem-solving, and decision-making skillsEffective communication and stakeholder management abilitiesCertifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or equivalent are a plus.Experience:Demonstrated experience in conducting security analysis, incident response, and vulnerability management in a complex environmentHands-on experience with security tool optimization, security assessments, and penetration testingProven track record of incident response efforts and effectively managing security incidents from detection to resolution.Key Responsibilities:Security monitoring and analysis:You assist in monitoring security events and alerts from various sources such as SIEM, IDS/IPS, antivirus systems, and endpoint detection platformsYou conduct initial analysis of security events to determine their nature and potential impact on the organizationYou collaborate with senior analysts to investigate and respond to security incidents, including malware infections, phishing attempts, and unauthorized access attempts.Incident response:You contribute to incident response activities by providing technical assistance during security incidents, including containment, eradication, and recovery effortsYou document incident response procedures, develop post-incident reports, and conduct lessons learned sessions to improve incident handling capabilitiesYou implement proactive measures to enhance incident detection and response capabilities, such as developing playbooks for common attack scenarios.Vulnerability management:You support the vulnerability management process by assisting in vulnerability scanning, assessment, and remediation effortsYou help prioritize and track the resolution of identified vulnerabilities in systems and applicationsYou collaborate with system owners and IT teams to ensure timely patching and mitigation of identified vulnerabilities, leveraging automation and orchestration where possibleYou conduct security assessments and penetration tests to identify weaknesses in systems, applications, and network infrastructure.Security tool:You assist in the administration and configuration of security tools and technologies, such as firewalls, intrusion detection/prevention systems, and endpoint security solutionsYou participate in the evaluation and testing of new security technologies to enhance the organization's security postureYou optimize the configuration and tuning of security tools and technologies to improve detection accuracy, reduce false positives, and enhance overall effectivenessYou evaluate emerging security technologies and solutions, recommending and implementing enhancements to the security toolset based on industry best practices and organizational requirements.Security awareness and training:You support security awareness and training initiatives by assisting in the development of educational materials and delivering security awareness briefings to staff.#J-18808-Ljbffr