Bachelor’s degree in Information Technology, Computer Engineering, Cybersecurity, Digital Forensics, or a related discipline.
Minimally 5–7 years of experience in cybersecurity operations, threat analysis, or security engineering.
Professional certifications such as CISSP, CISM, CEH, GIAC (GCIH, GCFA, GCTI), or equivalent are highly desirable.
Proven work experience in cybersecurity, with a focus on policy creation, monitoring, and incident response.
Demonstrated experience managing cybersecurity projects, including planning, execution, and monitoring, ensuring initiatives are completed on time and within budget.
Familiarity with frameworks such as NIST, ISO 27001, or CIS Controls.
Experience working with cross-functional teams and external vendors in a complex enterprise environment.
Experience with Endpoint Detection and Response (EDR) and Endpoint Protection Platforms (EPP) such as CrowdStrike, Microsoft Defender, or Palo Alto.
Familiarity with Security Information and Event Management (SIEM) tools (e.g., Splunk, QRadar, Sentinel) for log correlation and threat analysis.
Strong knowledge of Network Traffic Analysis (NTA) and User and Entity Behavior Analytics (UEBA) tools to detect anomalous activity.
Hands-on experience with digital forensics tools such as EnCase, FTK, or SIFT for evidence collection and analysis.
Ability to use scripting languages such as Python, PowerShell, or Bash to automate investigation workflows and data analysis.
Expert-level knowledge of Windows internals (Event Logs, MFT, Prefetch) and Linux internals (Syslog, Auth logs, Cron, persistence mechanisms).Strong understanding of TCP/IP, DNS, and HTTP/S protocols to analyze lateral movement and C2 (Command & Control) traffic.
Experience responding to incidents in AWS, Azure, or GCP (identity theft, S3 bucket exposure, etc.).