704-280-9676 info@huntsource.io
HuntSource.io
  • About
    • The HuntStream
    • Mission & Values
    • Leadership Team
  • Services
    • Capabilities
    • Areas of Expertise
  • Jobs
  • Blogs
  • News
  • Events
  • Contact
Select Page

How to Land a Cyber Security Job in 30 Days

by HuntSource | Feb 18, 2020 | Cyber Security, Recruitment Insights |

February 18, 2020 It may seem like too tall of an order to land a cyber security job in 30 days. But it can be done. It’s realistic if you are willing to do the hard work and be tenacious to make it happen. Read on for specific insights on how to pull off this feat....

Biggest Obstacles Frustrating Cyber Security Job Seekers and Employers

by HuntSource | Feb 10, 2020 | Cyber Security |

February 10, 2020 You’re a cyber security engineer and want to find an exciting career opportunity in this arena. But several obstacles are preventing you from making this happen. For example, you may get offered a big salary, say $200,000 per year. The fact that...

HuntSource, the Southeast’s First and Only Cyber and Tech Start-up Devoted to Pinpointing Technology Talent, Opens an Atlanta Office.

by HuntSource | Jul 9, 2019 | HuntSource News |

FOR IMMEDIATE RELEASE July 9, 2019 HuntSource, the Southeast’s first and only cyber and tech start-up devoted to pinpointing technology talent, opens Atlanta office. Atlanta ranks #6 nationwide for metro areas with the most cyber security job postings according...

Latest Posts

How to Demystify And Improve Data Scientist Careers and Productivity

10:09 am 16 Mar 2020

The Talent Shortage Crisis in Cyber Security and How to Overcome It

1:06 pm 27 Feb 2020

How to Land a Cyber Security Job in 30 Days

2:00 pm 18 Feb 2020

Biggest Obstacles Frustrating Cyber Security Job Seekers and Employers

1:57 pm 10 Feb 2020
ai for  cyber security

The Role of Artificial Intelligence in Cyber Security

10:57 am 28 Jun 2018
Copyright HuntSource | Sitemap | B2B Cyber Security, Data Intelligence, and Analytics Recruiting
Made with ♥ in Charlotte

 

  • Follow
  • Follow
  • Follow
  • Follow

Head of Incident Response

  • 10+ years of stable, progressive security experience and currently serving as the Global Head of Incident Response for a Fortune 100 corporation in the DMV area
  • GCIH, ECIH, CEH, CompTIA Security+ & Network+ certifications, in addition to a Master of Science in Cyber Security
  • Heavily focused on building and strengthening relationships across the globe at all levels
  • Humble, great sense of humor, and fantastic listener

Head of Incident Response

3 + 6 =

Additional Responsibilities:

  • Build, grow, develop, and oversee a security operations team including external providers to increase the value, sophistication and application of internal threat intelligence services.
  • Enhance the functionality and proficiency of Company’s SOC practice which include the following:
  • Lead the CSIRT practice responsible for 24x7x365 monitoring of all security events and management of all security threats, incident response and cyber threat intelligence.
  • Operating intrusion detection and prevention (IDS/IPS) capabilities and managing Incident Response capabilities across the Enterprise
  • End-to-end ownership of vulnerability scanning and associated remediation plans and processes
  • Lead technical Identity and Access Management (IAM) services
  • Architect, engineer and operate Cyber Security tools to support business operations of all systems globally
  • Define, identify and classify critical information assets, assess threats and vulnerabilities regarding those assets and implement safeguards
  • Support the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies

 

Qualifications and Desired Experience:

  • Hands on technical experience, deep technical knowledge and understanding of information security and associated solutions and tools such as data loss prevention, database security, endpoint and network security tools, and best practices.
  • BS or MA in Computer Science, Information Security, or a related field
  • Certified Information Systems Security Professional (CISSP) and/or Certified Information Security Manager (CISM)
  • 5+ years of experience in information security, especially on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC)
  • 10+ years of experience in another IT function, especially IT Audit
  • 3+ years of experience with regulatory compliance and information security management frameworks (e.g., IS027000, COBIT, NIST 800, etc.)
  • Prior experience in situations requiring one to react quickly, decisively, and deliberately in high-stress, high-impact situations
  • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
  • Able to effectively influence others to modify their opinions, plans, or behaviors
  • Strong depth of knowledge in business needs and commitment to delivering high-quality, prompt, and efficient service to the business
  • Technical expertise in anti-virus solutions, virus outbreak management, and the ability to differentiate virus activity from directed attack patterns
  • Technical expertise in Intrusion Prevention System (IPS)/Intrusion Detection System (IDS), SIEMs and other Computer Network Defense (CND) security tools.

Director IT Security Operations

8 + 9 =

  • Machine Learning/Artificial Intelligence
  • Business Intelligence
  • Threat Intelligence
  • Data Science
  • Data Analytics
  • Data Architecture
  • Data Engineering

Cyber Security Operations

  • Threat Intelligence/Vulnerability Management
  • Incident Response
  • Security Assessment
  • Digital Forensics
  • Endpoint Protection
  • Intrusion Detection
  • Malware Analysis
  • Infrastructure Security

 

Cyber Security Technology

  • Web Application/Mobile & Cloud Security
  • Security Operation Center
  • Red, Blue, and Purple Teaming
  • Identity and Access Management
  • Cyber Analytics
  • Vulnerability Assessment
  • IT Audit & Controls
  • Governance & Policy
  • IT Risk and Compliance
  • Data Privacy & Protection
  • Business Continuity
  • Disaster Recovery
  • Third Party Risk Management