Role Title: Cyber Security Engineer III
Role Locations: San Jose, CA
Duration: Long term contract (W2 only)
Rate:$70-75/hr
Description:
- Must demonstrate expert knowledge in one (1) or more of the following areas: Incident Response, Digital Forensics, Monitoring and Detection , Cyber Intelligence Analysis
- Coverage – Must be willing to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10 hour shifts with four days on, three (3) days off and possible rotations across Day, Swing, and Graveyard shifts as needed.
- Incident Response – Getting people to do the right thing in the middle of an investigation.
- Offensive Techniques – Penetration testing, IOCs, and exploits at all layers of the stack.
- Logs - you should be comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats.
- System Forensics – Basic understanding of image acquisition techniques, memory forensics, and the like.
- Qualifications: Bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or a related field.
- Minimum three (3) years of professional experience in incident detection and response, malware analysis, or digital forensics.
- Must have at least one (1) of the following certifications: SANS GIAC: GCED, GCIA, GPEN, GWAPT, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON, GCIH ISC2: CCFP, CCSP, CISSP Cisco: CCNA, CCNP CERT: CSIH EC Council: CEH, ENSA, CNDA, ECSS, ECSP, ECES, CHFI, LPT, ECSA, or ECIH Offensive Security: OSCP, OSCE, OSWP and OSEE Digital Forensics: EnCE, CB, MiCFE, ACE, GCFA, GCFE
- In addition, a minimum of one (1) year of specialized experience in one or more of the following areas: Security Assessment or Offensive Security Application Security Security Operations Center/Security Incident Response Cyber intelligence Analysis.