Roles & Responsibilities
As a Systems Specialist, you will be supporting various cybersecurity functions, including:
- Staying updated with the latest vulnerabilities, security trends, and techniques in cyber threats and hacking methodologies.
- Conducting research on emerging threats and vulnerabilities, and providing recommendations to enhance the organization's security posture.
- Performing proactive threat hunting exercises to identify and investigate potential security incidents and suspicious activities within the network.
- Documenting all findings, analysis, recommendations, and investigation results clearly, and generating reports for management and stakeholders.
- Developing and tuning security monitoring rules, correlation logic, and detection signatures.
- Utilizing various security technologies, including SIEM tools, network traffic analysis tools, EDR systems, vulnerability management systems, and threat intelligence platforms.
- Collaborating with other cybersecurity teams, such as incident response, security operations, and threat intelligence, to share findings and coordinate investigations.
- Developing and implementing a cyber intelligence framework to systematically collect, process, and leverage intelligence for cybersecurity decision-making.
- Integrating the cyber intelligence framework with the SOC and incident response teams to effectively detect, prevent, and respond to threats.
- Monitoring and collecting information from sources like threat feeds, security vendors, dark web forums, and social media to identify emerging threats.
- Analyzing threat intelligence data to identify patterns, trends, and risks.
- Prioritizing and triaging threats based on relevance and potential impact.
- Conducting in-depth analysis of threat actors, their tactics, and motivations, and providing insights on potential risks.
- Producing reports, briefings, and alerts on threats, trends, and risks for stakeholders, including technical details for cybersecurity teams and executive summaries for management.
- Providing intelligence support during security incidents to help incident response teams understand threats and guide containment and remediation efforts.
- Supporting vulnerability management by analyzing threat data to identify vulnerabilities and exploit trends, aiding in patching and mitigation.
- Collaborating with threat hunters and cybersecurity teams to refine threat hunting strategies based on intelligence insights.
Qualifications
- Fundamental knowledge of application security, including interpretation of HTTP response codes and WAF violations.
- Understanding of network security best practices.
- Knowledge of cyber threats and hacking methodologies.
- Strong problem-solving skills and ability to work under pressure; willingness to learn.
- Proficiency with Microsoft Office products like Word and Excel.
- Additional certifications such as CCNA, CCNP, CISSP are a plus.
- Ability to work beyond business hours, including weekends, when necessary.