Incident Response/ Cyber Security Advisor


Job Details

This individual is responsible for executing the SOC and Incident Response strategy and operations. This person must have the ability to evaluate existing security systems or architecture to determine potential risk of a data breach. The Advisor must be capable of developing departmental policies or procedures that minimize the potential risk. This role will develop innovative and effective procedures for the Security Operations Center to enhance response time, coordination and incident response operations, and build an expert team of Cyber Security Incident Response and forensics experts. Can be called upon to train staff on security operations concepts, develop incident management and forensics teams, and integrate intelligence data into monitoring and operations activities.


EDUCATION, EXPERIENCE, TRAINING

  • 10+ years of experience in Cyber Security
  • 8+ years of experience with defensive Cyberspace operations
  • 5+ years of hands on experience in SIEM technologies
  • 5+ years of experience in Incident response process and incident handling
  • 5+ years of experience in network intrusion detection
  • Experience with Cyber incident management, response and reporting procedures
  • Experience with healthcare compliance regulations
  • Must possess one or more current, applicable professional/technical certifications: Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Security Compliance Specialist (CSCS), Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Certified Internal Auditor (CIA), GPEN, GWAPT, SANS GIAC/GSEC, CHFI or CEH
  • Specific experiences delivering large-scale, scalable technology infrastructure solutions to support rapid business growth
  • Advanced knowledge of Cyber Security management practices, network and application vulnerability assessments, change control, business continuity planning, data privacy, and risk assessment practices
  • Experience working with log management, security monitoring, vulnerability management and security incident/event management tools
  • Knowledge of network monitoring, analysis, troubleshooting, and configuration control technologies
  • Practical leader, capable of creating and implementing plans to achieve strategic objectives
  • Capable of gaining support for initiatives through influence and the use of business rationale
  • Ability to think independently and provide self and group direction, solve various problems and make informed, rational decisions
  • Ability to research, assimilate information from both IT and business functions, apply strong problem IT and business functions, apply strong problem solving and analytical skills, and influence issue resolution





 Irvine Technology Corporation

 06/01/2024

 All cities,CA