Cyber Defense Job Description

Cyber Defense Job Description

4.5
178 votes for Cyber Defense
Cyber defense provides expert in-depth knowledge in collecting, analyzing, and escalating security events; responding to computer security incidents, and/or collecting, analyzing, and disseminating cyber threat intelligence;.

Cyber Defense Duties & Responsibilities

To write an effective cyber defense job description, begin by listing detailed duties, responsibilities and expectations. We have included cyber defense job description templates that you can modify and use.

Sample responsibilities for this position include:

Other experience would include working with Linux and Windows OS and knowledge of penetration testing / exploitation techniques
Experience and familiar with type of network attacks as it relates to reviewing and analyzing logs within the integration of Security information and event management (SIEM)
Interface with other Global Information Security (GIS) departments, , other Technology departments and business stakeholders
Be responsible for handling and data streaming on massive datasets
Bring analytic prototypes to scale, using cutting edge cloud based technology
Build engaging user interfaces to allow users to digest and interact with data in an intuitive, streamlined manner
Will use Cloudera based cloud technology stacks to tease novel but relevant information that otherwise would have gone undetected
Be part of a highly skilled and diverse team
Use cutting edge cloud technologies to perform data analytics on disparate data sets
Develop using Assembly, C, Java, PHP, Python / Perl, and or Ruby

Cyber Defense Qualifications

Qualifications for a job description may include education, certification, and experience.

Licensing or Certifications for Cyber Defense

List any licenses or certifications required by the position: CEH, IAT, II, GCIA, CSSP-A, CISSP, CISM, CISA, GPEN, GWAPT

Education for Cyber Defense

Typically a job would require a certain level of education.

Employers hiring for the cyber defense job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and High School Degree in Computer Science, Information Security, Technical, Engineering, Information Technology, Science, Business, Technology, Management, Architecture

Skills for Cyber Defense

Desired skills for cyber defense include:

Analyzing
Collecting
Tools and technologies used for enterprise security
Linux
Solaris
UNIX
IRIX
MAC operating systems
SUSE
Disseminating cyber threat intelligence

Desired experience for cyber defense includes:

This position will monitor incidents submitted and establish correlation to broader threats when they may exist
Analyze and respond to unauthorized activity within the global computing environment while managing the identification, containment, eradication, recovery and lessons learned / root cause analysis documentation
Contribute to Incident Response process definition and the development and maintenance of documented procedures and techniques, including process integration with any 3rd party vendors, internal IT organizations
Participate in efforts to drive Incident Response application updates necessary to collect various key metrics for reporting to senior management
The candidate that fulfills this role will be expected to have process documentation experience and excellent intra-business relationship experience
Must have hands-on experience with Data Activity Monitor (DAM) and exposure to Vulnerability Management (VM) and Dynamic Data Masking (DDM)

Cyber Defense Examples

1

Cyber Defense Job Description

Job Description Example
Our company is growing rapidly and is hiring for a cyber defense. We appreciate you taking the time to review the list of qualifications and to apply for the position. If you don’t fill all of the qualifications, you may still be considered depending on your level of experience.
Responsibilities for cyber defense
  • Analyzing vulnerability assessment and penetration testing results to help identify stealthy threats
  • Increase our detective capabilities
  • Resolve Incidents faster
  • Protect Micron’s valuable intellectual property
  • Instruct the Incident Response Team members in the use of new processes/procedures, operating instructions
  • Assess potential risks with new applications and products and provide security requirements and recommendations for risk mitigation
  • Review and recommend new security policy, standards, best practices, and system configuration standards
  • Identify and respond to security incidents, alerts and vulnerabilities
  • Monitor and suggest enhancements for threat detection mechanisms
  • Configure SIEM log collection for event logs
Qualifications for cyber defense
  • Security and IT Metrics experience a plus
  • Experience with process automation and/or scripting
  • Other related certifications such as ITIL, PMP, SANS/GSEC, CIPP, CRISC, CGEIT, CPA/CA are preferred, but not required
  • Participate and assist in responding to global security incidents
  • Provide a point of escalation for incidents within various business units
  • Exposure \ knowledge of F5 ASM integration for end-to-end database security is a plus
2

Cyber Defense Job Description

Job Description Example
Our company is growing rapidly and is looking to fill the role of cyber defense. Please review the list of responsibilities and qualifications. While this is our ideal list, we will consider candidates that do not necessarily have all of the qualifications, but have sufficient experience and talent.
Responsibilities for cyber defense
  • Interface with other Global Information Security (GIS) teams, , other Technology departments and business stakeholders
  • Perform Defensive Cyber Operations to protect, detect and respond to cyber threats and attack using SIEM, vulnerability assessment, discovery, infrastructure (firewall, IPS/IDS, proxy, network capture), host based security, penetration testing/external assessment tools, forensics
  • Overseeing the penetration testing of applications (to include mobile applications) wired and wireless network environments
  • Conduct web and mobile application security vulnerabilities assessments (review designs, perform pentest, code review, and security checks) through the use of scanning tools / manual checks and notify the appropriate team to take necessary action
  • Work jointly with Development Teams, Architects and Cyber Defense teams to periodically review application code and be able to define security posture of applications and back-end systems
  • Work jointly with Development Teams, Architects and Cyber Defense teams to clearly define the scope of testing and the related rules of engagement
  • This position is staffed in shifts supporting a 24x7x365 regional security operations center
  • Utilizing current and future tools to perform hunting for complex insider and outsider threats
  • Supporting proactive deep malware analysis, and recommending defensive actions to effectively defend against malware related attacks
  • Recommend how to optimize security monitoring tools based on threat hunting discoveries
Qualifications for cyber defense
  • Previous experience as a DBA, Data Modeler or Data architect a plus
  • Must have hands-on experience with rule creation and maintenance, Tripwire administration, report analysis, providing recommendations of future configurations & rules and compliance recommendations
  • Bachelor's of Science in Computer Science or related scientific/technical field or equivalent
  • At least 10 years of experience with C++, OO Design, and Java
  • Experience in working with an Agile, specifically Scrum team
  • Bachelor's degree in technical field and at least 7 years of job-related experience
3

Cyber Defense Job Description

Job Description Example
Our innovative and growing company is hiring for a cyber defense. Thank you in advance for taking a look at the list of responsibilities and qualifications. We look forward to reviewing your resume.
Responsibilities for cyber defense
  • Helping develop meaningful metrics to reflect the true posture of the environment allowing the organization to make educated decisions based on risk
  • Exercising analytical skills and knowledge of supervision regulations
  • Advise on leading Cyber Operations projects to include requirements, supporting technologies, policy, challenges
  • Interact with senior military leadership and be able to translate specific cyber operations needs into supporting military documentation – Policy, CONOPS, SOPs, frameworks
  • Contribute to the development and cultivation of business and vendor relationships presented or experienced insight into a functional process or issue
  • Conduct threat-based cyber Blue Teaming along with the Red Team / Exploitation and penetration testing against Army and DoD networks
  • Conduct DISA Command Cyber Readiness Inspections
  • Work with peers to implement changes, solicit requests for enhancement and coordination with the transformation team to deliver world class cyber defense capabilities
  • Maintaining knowledge of emerging threats, vulnerabilities, and intelligence within the cyber security field to ensure subscribers are remediating against known threats
  • Assisting subscribers with vulnerability remediation, as necessary
Qualifications for cyber defense
  • Experience within cyber defense including continuous monitoring, incident response, digital forensics, malware sandboxing, and enterprise vulnerability management
  • Experience with threat management, SIEM, IDS, and enterprise vulnerability management tools
  • Self-motivated, proactive approach in the application of cyber defense practises
  • Application deployment via networked push/pull services
  • Server Baseline Development/Sustainment support to include implementing/validating applicable STIGS/SRGS controls
  • Develop Standard Operating Procedures (SOPS) and map task execution processes
4

Cyber Defense Job Description

Job Description Example
Our company is looking to fill the role of cyber defense. We appreciate you taking the time to review the list of qualifications and to apply for the position. If you don’t fill all of the qualifications, you may still be considered depending on your level of experience.
Responsibilities for cyber defense
  • Deploying, troubleshooting, and maintaining network-based vulnerability scanners at subscriber sites to ensure appropriate coverage of scanning services
  • Design and implement Cyber Defense strategies, plans and procedures
  • Measure and report on Cyber Defense performance and growth goals
  • Oversee daily operations of Cyber Defense and the work of practice managers
  • Write and submit reports to practice leaders inall matters of importance
  • Implement Cyber Security processes for the Cyber Protection Branch and Active Cyber Defense teams
  • Employee will participate as a member of integrated government/contractor teams of technical and subject matter experts in the conduct of Cyber Security, Information Assurance / Computer Network Defense (IA/CND), Incident Handling and Response in support of HQ USCENTCOM
  • Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect an eradicate threat actors on the network
  • Duties include anomaly detection, tracking, reporting and response specifically targeted towards computer or network security incidents or infractions
  • Create correlations and other logic to identify attackers and defend the network against advanced attacks
Qualifications for cyber defense
  • Prefers three years experience minimum as a domain-level administrator within a DoD network within the past four years
  • One year experience as an Assured Compliance Assessment Solution (ACAS) operator to include Nessus Scanner or Retina within a DoD network and within the last three years
  • One year experience as a networked automated remediation system (patch tool) operator, within a DoD network and within the last three years
  • Experience with software development methodologies and technologies
  • Experience with testing integration and maintenance if IA products and systems
  • Experience with software systems engineering
5

Cyber Defense Job Description

Job Description Example
Our company is looking for a cyber defense. Please review the list of responsibilities and qualifications. While this is our ideal list, we will consider candidates that do not necessarily have all of the qualifications, but have sufficient experience and talent.
Responsibilities for cyber defense
  • Identify risks to computer systems and applications, and make written and verbal remediation recommendations to leadership
  • Provide accurate and timely forecasts within SFDC Skills
  • Member of the engineering innovation team
  • Assist Sponsor with identifying architectural strategy for mission related cyber defense infrastructure
  • Provide technical leadership and tactical support to cyber defense projects in multiple areas of expertise including (but not limited to) Cloud infrastructure, sensor networks, big data analytics, and custom product development Projects and associated implementation teams may vary in size and complexity Duties / Responsibilities may vary from project to project
  • Ensure delivered systems are built to ICD 503 accreditation standards and participate in the accreditation process, as needed
  • Provide technical briefings to audiences at multiple levels in the Sponsor organization
  • Assessing threat and vulnerability information from all sources (both internal and external) and promptly applying applicable mitigation techniques initiating indications and warnings
  • Developing mitigation and remediation plans as a result of vulnerability assessment findings while monitoring current reports of computer malware to determine when to update protection systems
  • Fostering and maintain relationships with key stakeholders and business partners
Qualifications for cyber defense
  • Experience with systems security analysis and implementation
  • Experience with software design assurance
  • Experience in working with an Agile, including Scrum team
  • Experience in large scale enterprise Cyber Solutions, including all areas of defensive cyber and network operations
  • Familiar with interpreting the log output of a wide selection of network and host device classes (HIDS, NIDS, Firewalls, Proxies, Routers, Switches, WAF's, Servers, Desktop Controls, Endpoint Protection)
  • Must provide focused effort on documentation and process improvement for both technical and business centric procedures

Related Job Descriptions

Resume Builder

Create a Resume in Minutes with Professional Resume Templates