M+E Technology Job Board
Cyber Security Consultant, Kroll
Kroll
Description
Position Overview: The Cyber Security Consultant will perform cyber security monitoring and response activities using leading endpoint and network monitoring tools to identify, analyze, and respond to a variety of threats and threat actors impacting systems and networks around the globe.
Responsibilities:
- Performing daily threat hunting, detection and analysis of events generated by advanced endpoint monitoring solutions and related security tools.
- Writing of basic threat reports associated with significant events.
- Assist in ongoing research, development, and testing of enhanced threat detection techniques and indicators.
- Conduct basic forensic, malware triage and sandbox analysis.
Qualifications
- Bachelor’s degree or equivalent work experience
- Low level understanding of Windows operating system architecture fundamentals (NTFS, registry, processes, binaries, DLL’s, etc.) and administration. Similar understanding of MacOS and/or Linux a plus.
- Understanding of common malware behavior and persistence mechanisms.
- Working knowledge of various scripting languages and/or security and malware analysis tools such as: Python, Ruby, Unix Shell, PowerShell, Yara,
- Working knowledge of TCP/IP and related networking concepts.
- Prior experience managing or analyzing output from endpoint threat detection products such as Carbon Black, Splunk or other SIEM solutions, intrusion detection solutions, or related security products preferred.
- Excellent written and verbal communication skills
- Understanding of information security basics especially in the realm of security incident response
- Relevant cyber security certifications including GCIA, GCIH, GCWN, CISSP, GREM a plus.

Kroll
Description
Position Overview: The Cyber Security Consultant will perform cyber security monitoring and response activities using leading endpoint and network monitoring tools to identify, analyze, and respond to a variety of threats and threat actors impacting systems and networks around the globe.
Responsibilities:
- Performing daily threat hunting, detection and analysis of events generated by advanced endpoint monitoring solutions and related security tools.
- Writing of basic threat reports associated with significant events.
- Assist in ongoing research, development, and testing of enhanced threat detection techniques and indicators.
- Conduct basic forensic, malware triage and sandbox analysis.
Qualifications
- Bachelor’s degree or equivalent work experience
- Low level understanding of Windows operating system architecture fundamentals (NTFS, registry, processes, binaries, DLL’s, etc.) and administration. Similar understanding of MacOS and/or Linux a plus.
- Understanding of common malware behavior and persistence mechanisms.
- Working knowledge of various scripting languages and/or security and malware analysis tools such as: Python, Ruby, Unix Shell, PowerShell, Yara,
- Working knowledge of TCP/IP and related networking concepts.
- Prior experience managing or analyzing output from endpoint threat detection products such as Carbon Black, Splunk or other SIEM solutions, intrusion detection solutions, or related security products preferred.
- Excellent written and verbal communication skills
- Understanding of information security basics especially in the realm of security incident response
- Relevant cyber security certifications including GCIA, GCIH, GCWN, CISSP, GREM a plus.