Handling, analyzing, and responding to cybersecurity incidents.
- Perform incident response activities, including forensic evidence collection, intrusion correlation, tracking, threat analysis, and system remediation.
- Analyze logs from multiple sources to identify potential network security threats.
- Assess incident priorities to determine vulnerabilities, scope, urgency, and potential impact, and provide recommendations for rapid remediation.
- Correlate incident data to identify vulnerabilities.
- Analyze cybersecurity defense trends and prepare reports.
- Conduct initial forensic image acquisition in line with relevant investigation standards and analyze them to determine appropriate remediation actions.
- Analyze network alerts from various sources to identify root causes of incidents.
- Track and document incidents.
- Develop and publish cybersecurity defense guidelines and procedures.
- Collect intrusion artifacts and leverage them to reduce future incidents.
- Prepare “lessons learned” reports.
- Monitor external threat intelligence sources.
- Coordinate incident response efforts.
- Support legal teams when required.
- Collaborate with threat analysts.
- Identify information sources for investigations.
4 – 6 years
Bachelor’s degree in Computer Science or equivalent
GCIH + Security+