Bachelor’s Degree preferred, though relevant experience can be considered in lieu of formal education.
Minimum of 7+ years of experience in IT, with a significant focus on cybersecurity.
Strong experience in implementing and managing cybersecurity services such as incident response, vulnerability management, and identity and access management.
Technical expertise in cybersecurity technologies like Multi-Factor Authentication, Endpoint Protection, SIEM, etc.
Understanding of secure cloud architecture practices and experience with major cloud service providers (AWS, Azure, GCP).
Experience with Microsoft and Linux products, and knowledge of perimeter security systems (e.g., Firewalls, VPN).
Awareness of various cyber threats and threat intelligence.
Hands-on experience in cyber operations and familiarity with related toolsets.
Strong analytical, problem-solving, and communication skills.
Capacity to handle multiple tasks and deliver results in a dynamic environment.
One or more industry certificates e.g., OSCP, CISSP, CEH, CHFI, GIAC, GREM Assets
Practical experience in areas like SOC operations, EDR, MFA, SIEM, DLP, and forensics.
Skills in programming languages (Python, PowerShell) and log analysis are beneficial.
Ability to communicate effectively with technical and non-technical stakeholders.
What You Will Be Doing
Implementing and managing key security operations, including incident response, and conducting technical reviews of cloud, on-prem infrastructure, and proprietary applications.
Participating in the development and execution of cybersecurity strategies in line with IT operations.
Deploying, maintaining, and improving cybersecurity systems based on business and stakeholder requirements.
Supporting the evaluation of new cybersecurity tools and methodologies.
Collaborating with third-party service providers to ensure quality and effectiveness of cybersecurity solutions.
Assisting in cybersecurity testing and remediation activities.
Contributing to the integration of security considerations in new technology implementations.
Participating in security control assessments and making recommendations to enhance the organization’s IT systems’ security.
Conducting vulnerability scans of infrastructure and applications, identifying security weaknesses and developing remediation strategies.
Assisting in the implementation of cybersecurity projects from design through to execution, ensuring compliance with industry best practices.
Supporting assessments of corporate security posture and suggesting improvements.
Engaging in active security incident management, including detailed investigations and reporting.
Assisting in delivering cybersecurity solutions that meet the functional, quality, deadline, and cost requirements for internal customers.
Performing daily monitoring, analysis, and reporting of security alerts and incidents.
Thank you!
Seniority level
Mid-Senior level
Employment type
Contract
Job function
Other
Industries
Truck Transportation
Referrals increase your chances of interviewing at Motion Recruitment by 2x