Currently pursuing an Undergraduate/Master degree in Digital Forensics, Cyber or Information Security, Computer Science, Information Technology or related field.
Ability to work effectively independently and in a fast-paced work environment.
Experience with scripting languages (e.g. Python, Go and PowerShell) for automation and analysis.
Fundamental understanding of networking protocols (OSI Layers, TCP/IP, DNS), experience with traffic analysis tools is a bonus.
Responsibilities-
Triaging security alerts and events from various log sources accurately and responding expediently.
Conduct technical analysis and assessments of security-related incidents, including malware analysis, packet-level analysis, and system-level forensic analysis.
Conduct analysis of network traffic and output from various network-centric technologies.
Develop Incident Response Playbooks, perform proactive threat hunts based on threat intelligence gathered.
Develop SOAR playbooks, automate routine processes, create or enhance detection and response capabilities.
Mandatory Skills: Hardware Security Models Additional Skills: C++