OPEN POSITIONS! HURRY UP! FOR #CYBERCOR PROJECT: (a) Linux professional: - At least 5 years of linux system administration - - Installing and Managing of linux systems servers and workstations in several distributions and knowledge of system hardware - Good knowledge of linux command line, scripting, file system structure and permissions (b) Networking expert - At least 8 years of networking engineering - Good Hands-on knowledge on Cisco IOS/(alternative) commands and managing complex environment - installation and configuration of cisco switches and routers (layer 2 and Layer 3) - Hands-on knowledge in configuring VLANS and routing protocols (static and dynamic) - Good knowledge of theoretical models (7 layers and TCP/IP) - Good knowledge in IPv4/IPv6 , subnets , CIDR and Decimal/Octal/Hex conversion. (c) System expert - At least 8 years of managing windows servers environment - Install & Configure Server 2012 R2\2016\2019 , Roles & Features , Tools - Install and manage Active directory , manage users , groups and permissions in organizations - Hands-om knowledge in GPO managing , hardening windows servers - Hands on knowledge in managing DNS , DHCP , backup servers , WSUS servers , Terminal servers (d) Cyber security expert - At least 8 years of cyber security experience - Hands-on knowledge in PT in application and infrastructure level - Hands on knowledge in Kali linux environment and tools - Hands-on knowledge in Metasploit environment and tools - Hands-on knowledge in malware analysis (static and dynamic) - Hands on knowledge in file system forensics - Hands-on knowledge in managing firewall environments (e) For Malware Analysis and Windows Memory Forensics Expert - At least 10 years of Malware analysis experience (static and dynamic) - Hands-on knowledge with various tools for analysis including IDA and Olydbg , Good knowledge of yara rules - Hands-on knowledge in debugging malicious binaries - Hands-on knowledge in volatility or similar tools for memory forensics - Hands-on knowledge in detecting code injections , API hooks , rootkits , Kernel callbacks and timers (f) For SOC Analyst expert: - At least 10 years of managing complex soc environments in hands-on level - At least 5 years of Malware analysis experience (static and dynamic) , extracting IOCs - Hands-on experience in: analyzing network traffic using various tools , handling SOC cases and incidents , optimizing SIEM rules - Hands-on experience in file forensics - Hands-on experience in memory forensics using various tools - Hands-on experience in SIEM environment , including central logging - Using various threat intelligence tools (virus total , yara rules) CV mail to: dreamteam@cybercor.md
Dmitry Tsepilovan’s Post
More Relevant Posts
-
#Egypt #Egypt2024 #opportunity #vacancy #Hiring #Hiringalert #Job #Jobseekers #Jobalert #Work #HiringNow #JobOpportunity #JobOpening #Vacanies #jobs #SOC_Analyst #Communication_Engineering #Computer_Science #SOC #Networking #Operating_Systems #Windows #Linux #Firewalls #IDS/ #IPS #SIEM #Security #Cybersecurity #NIST #Vulnerability_Scanners #Packet_Analyzers #Cybersecurity_Framework #Cyber_Attacks #Virus #Malware_Analysis #Phishing_Analysis #Monitor #Incident_Response #Containment #Eradication #Incident_Triage #Recovery #Security_Incident_Handling #Analyze_Security_Events #IOCs #Forensic_Analysis #CEH #OWASPtop10 #Vulnerability_Management #Unix #Network_Troubleshooting #Analysis #Security_Threats #Reports #Network_Protocols #Traffic_Analysis #Ethical_Hacking #OWASP 🔺 Paymob is hiring " SOC Analyst " 🏮 Main Job Purpose Participating in 24 x 7 x 365 coverage for event monitoring and incident detection and supports preliminary incident response where appropriate. Analyzing output from various technologies to effectively identify anomalous events and investigative security incidents. 🏮 Accountabilities • Use SIEM solution effectively to monitor day to day notable events. • Handle any other kind of forwarded security incidents from different teams. • Triage alerts as they come in and action appropriately. Responsible for triage of alerts, Phishing attempts, and AV Alerts … etc. • Respond to common alerts in a consistent and repeatable manner from multiple alerting sources. • Escalate unknown alerts to Level 2. Prepare and share shift/incident reports. 🏮 Requirements: • Bachelor’s degree in communication engineering, Computer Science • 0-1 years of experience in SOC • Strong knowledge of networking concepts, operating systems (e.g., Windows, Linux), and common security technologies (e.g., firewalls, IDS/IPS, SIEM). • Familiarity with security tools such as vulnerability scanners, packet analyzers Understanding of cybersecurity frameworks and best practices (e.g., NIST Cybersecurity Framework). • Basics on Cyber Security Cyber Attacks, Virus, Malware Analysis, Phishing Analysis. • Familiarity with incident response methodologies and tools. • Understanding of security incident handling processes, including incident triage, containment, eradication, and recovery. • Ability to analyze security events, identify indicators of compromise (IOCs), and perform basic forensic analysis. • Concepts in CEH, OWASP top 10. • Vulnerability Management, SIEM and different SIEM technologies. • Strong understanding of Windows, Linux / Unix, network troubleshooting analysis and current security threats. • Understanding of network protocols, traffic analysis, and the ability to detect suspicious activities or anomalies. 👉 👉 You can share your CV through : " amirasaid@paymob.com "
To view or add a comment, sign in
-
Cybersecurity | Network Security | System Administrator | System Engineer Recruitment Specialist | Connecting Top Professionals
#Veryurgentrole Job Details Position: Firewall Engineer Location: 100 Community Pl, Crownsville, MD 21032 (100% on site) 12+ month Interview mode: In person Minimum Qualifications: Six years of hands-on experience in Network Engineering/Architecture Five years of technical experience in architecture, design, implementation, support of firewall technologies Current Palo Alto Networks Certified Network Security Engineer (PCNSE) certification or hands-on experience implementing Palo Alto Advanced/NextGen features to include App-ID, User-ID, Content-ID, URL Filtering, Threat Prevention, WildFire, Virtual Wire, Virtual System (VSys), Global Protect, NAT Policies, Security Profiles, Inbound SSL Decryption, Outbound SSL Decryption (SSL Forward Proxy), File Blocking, and Data Filtering Hand-on experience with Palo Alto Panorama for centralized management of PANOS firewalls Self-starter, able to gather requirements, plan, execute firewall architecting and deployment efforts Able to perform gap analysis and initiate and execute architectural improvements App-ID, User-ID, Content-ID, URL Filtering, Threat Prevention, WildFire, Virtual Wire, Virtual System (VSys), Global Protect, NAT Policies, Security Profiles, Inbound SSL Decryption, Outbound SSL Decryption (SSL Forward Proxy), File Blocking, and Data Filtering Experience with network security architecture, design, and implementation best-practices i.e., Defense-in-depth architecture, knowledge of emerging Zero Trust architecture Experience with firewall architecture, design, and implementation Experience with operational and security hardening configuration for firewall solutions Experience with configuration management and change control for firewall solutions Experience with networking and switching protocols and infrastructure services, able to troubleshoot and identify DNS, DHCP, Wi-Fi protocols, NTP, SNMP, routing, switching, and firewall issues affecting connectivity of applications and services Knowledge and understanding of network infrastructure components such as Routers, Switches, IDS, IPS, NAC, VPN Gateways, Wireless APs etc. E: vishal.kushwah@tekinspirations.com #FirewallEngineer #Networkengineer #PaloAlto #PCNSE #PANOS #NextGen #AppID #UserID #ContentID #URLFiltering #ThreatPrevention, #WildFire #VirtualWire #VirtualSystem #GlobalProtect #NATPolicies #SecurityProfiles #Inbound #SSL #Decryption #OutboundSSLDecryption #FileBlocking #DataFiltering #ZeroTrust #DNS #DHCP #WiFi #protocols, #NTP #SNMP #routing #switching #IDS, #IPS, #NAC, #VPNGateways #WirelessAPs #Crownsville
To view or add a comment, sign in
-
Hi Professionals, Hope you're doing well. We have a Job Opening for Network Firewall Engineer for our client. If you're interested, Kindly share your updated resume with divya.ra@twsol.com. Role: Network Firewall Engineer Location: Columbus, OH Experience: 10+ Years Visa: H1b Passport: Mandatory Mandatory skills: ? Network firewall L3 skills in Cisco Firepower and Fortinet firewall, Palo alto, checkpoint firewalls.? Working experience in firewall migration from Fortinet firewall to Cisco Firepower and firewall platform migration.? A deep understanding of network perimeter controls? Experience with Kerberos, SSH, SSL, IPsec, and public key infrastructure.? Ability to develop Network Diagrams, Migration Plans, and Test Plans? Experience in network Denial of Service defense/avoidance/protection? Job description: ? Working as an L3 Firewall migration engineer and own the firewall migration from Fortinet to Cisco Firepower.? Firewall rules conversion from Fortinet firewall to Cisco firepower through available Cisco firewall rule migration tool.? Analyze the unused rules and address groups from the existing firewall and remove those from the new firewalls.? After analysis the existing firewall rules need to finalize the rules for new firewalls.? Co-ordination to the L2 firewall Engineer for the firewall configuration and plan for the firewall cutover, plan for the change request planning.? Prepare the test plan before cutover and after cutover.? Execute the firewall cutover during the change window.? handover the firewall to the operation team for the BAU support.? Serve as a subject matter expert through Analysis and Definition project phases of IT projects.? Review the design and implementation of network security service components and map them to the long-term vision.? Conducts risk assessment and provides recommendations for design.? Conducts encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research.? work group, team, or department- Prepare technical documentation including procedures, manuals, reports and standards.? Exhibit, problem solving, troubleshooting, resolution, communication, and customer service skills.? Analyze network performance, troubleshoot when necessary, and provide resolutions to technical problems.? Review and evaluate the impact of the Network Services, particularly Changes in the Network Environment, on the other IT Functions and other Customer IT Environment Providers. #c2c, #w2, #contract, #opentowork, #immediatehiring, #activelylooking, #onsite, #connections, #benchsales, #benchsalerecruiters, #hotlist, #vendorlist, #contractrole, #contractjobs,#activelylooking, #openforbusiness , #usajobs, #contractrole, #c2c, #c2cvendors, #c2cjobs, #c2chotlist , #c2cusajobs ,#c2crequirement, #contractjobs, #activelylooking , #openforbusiness , #opentowork , #usajobs , #contractrole, #c2c, #c2cvendors, #c2cjobs, #W2
To view or add a comment, sign in
-
Hi Folks, Hope you are doing well. Please share suitable candidates for below position. Role: Senior Cyber Security Engineer Location: New Jersey (Day 1 Onsite) Duration: Long Term Experience Needed: 9+ Years Visa: Any Job Description · Provide first level response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. · Coordinate with enterprise-wide cyber defense staff to validate network alerts · Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level · Work with TVM vendor, work with various to to drive the remediation and track the process, Open CR and schedule scans & follow up scans, analyze potential exploitation scenarios, assess applicable security controls, and evaluate potential impact. · Performing security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy · Participating in planning and recommendation of modifications or adjustments based on exercise results or system environment. · Implementing security measures assistance in disaster recovery and planning. · Utilizing OSINT to effectively detect and prevent indicators of compromise in affected systems. · Triaging according to organizational procedures to ensure that a genuine security incident is occurring. · Providing daily summary reports of network events and activity relevant to cyber defense practices · Providing timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. · Conducting research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). · Collaborating with stakeholders to resolve computer security incidents and vulnerability compliance. · Documenting and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. · Analyzing identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. · Monitoring and reviewing the most recent SIEM alerts to determine relevance and urgency. · Providing metrics and reports around security monitoring by designing dashboards for asset owners and management consumption · Contributing to the development and implementation of security architecture, standards, procedures and guidelines for multiple platforms · Documenting current case notes sufficient for effective shift handover, as well as reviewing current status via phone call or in person. Share profiles to ramesh@metafindsolutions.com
To view or add a comment, sign in
-
What does a Cybersecurity SOC Analyst do? Imagine being a detective in a digital world, constantly on the lookout for cyber threats. That's the role of a Cybersecurity SOC Analyst. They are the first line of defense, monitoring networks and systems for any suspicious activity. A Typical Day * Monitoring: Analysts spend much of their day watching over networks, servers, and applications for unusual patterns or behaviors. * Incident Response: When a threat is detected, they spring into action, isolating the affected system and containing the damage. * Threat Hunting: They proactively search for hidden threats that may have evaded initial detection. * Analysis: Analysts delve deep into incidents, analyzing the root cause and developing strategies to prevent future attacks. Skills and Qualifications To become a SOC Analyst, you'll need a strong technical foundation, including: * Networking: Understanding how networks function is essential. * Operating Systems: Proficiency in various operating systems (Windows, Linux, etc.) is crucial. * Security Tools: Familiarity with security tools like firewalls, intrusion detection systems, and antivirus software is a must. * Programming: Knowledge of scripting languages (Python, Bash) can be beneficial. * Problem-solving: The ability to think critically and solve complex problems is vital.
To view or add a comment, sign in
-
Hi Folks, Hope you are doing well. Please share suitable candidates for below position. Role: Senior Cyber Security Engineer Location: New Jersey (Day 1 Onsite) Duration: Long Term Experience Needed: 9+ Years Visa: Any Job Description · Provide first level response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. · Coordinate with enterprise-wide cyber defense staff to validate network alerts · Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level · Work with TVM vendor, work with various to to drive the remediation and track the process, Open CR and schedule scans & follow up scans, analyze potential exploitation scenarios, assess applicable security controls, and evaluate potential impact. · Performing security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy · Participating in planning and recommendation of modifications or adjustments based on exercise results or system environment. · Implementing security measures assistance in disaster recovery and planning. · Utilizing OSINT to effectively detect and prevent indicators of compromise in affected systems. · Triaging according to organizational procedures to ensure that a genuine security incident is occurring. · Providing daily summary reports of network events and activity relevant to cyber defense practices · Providing timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. · Conducting research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). · Collaborating with stakeholders to resolve computer security incidents and vulnerability compliance. · Documenting and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. · Analyzing identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. · Monitoring and reviewing the most recent SIEM alerts to determine relevance and urgency. · Providing metrics and reports around security monitoring by designing dashboards for asset owners and management consumption · Contributing to the development and implementation of security architecture, standards, procedures and guidelines for multiple platforms · Documenting current case notes sufficient for effective shift handover, as well as reviewing current status via phone call or in person. Share profiles to ramesh@metafindsolutions.com
To view or add a comment, sign in
-
Cybersecurity (or Security) is defined as the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices and data from unauthorised access. The Benefits of Security: - Protection against external and internal threats - Maintains and Improves business productivity - Maintains brand trust Common Job Titles Include: - Security Analyst or Specialist - Cybersecurity Analyst or Specialist - Security Operations Center ( SOC) Analyst - Information Security Analyst Responsibilities of a Security Analyst: - Protecting computer and network systems - Installing prevention software - Conducting periodic security audits There are 8 CISSP Security Domains which are: - Security and Risk Management - Asset Security - Security Architecture and Engineering - Communication and Network Security - Identity and Access Management - Security Assessment and Testing - Security Operations - Software Development Security #Cybersecuritywithtalk2luke #talk2luke
To view or add a comment, sign in
-
💡 Network Engineer Tip: Implement Role-Based Access Control (RBAC) for Network Devices! 🔒🛡️ Enhance network security and streamline administrative access by implementing Role-Based Access Control (RBAC) for your network devices. RBAC allows you to define roles and permissions, ensuring that users only have access to the resources and commands necessary for their responsibilities. Follow these steps to deploy RBAC effectively: 1. **Identify User Roles:** - Identify different user roles within your organization, such as administrators, operators, and guests, and determine the level of access each role requires. 2. **Define Role Permissions:** - Define the permissions associated with each role, specifying which commands and resources users in that role can access or modify. 3. **Create User Accounts:** - Create user accounts for each individual authorized to access the network devices, assigning them to the appropriate role. 4. **Implement RBAC Policies:** - Configure RBAC policies on network devices, mapping user roles to their corresponding permissions and restricting unauthorized access. # Example RBAC configuration on a Cisco router privilege exec level 15 show running-config privilege exec level 10 configure terminal. username admin privilege 15 secret your_password username operator privilege 10 secret your_password ``` 5. **Test and Audit:** - Test RBAC configurations to ensure users are only able to perform authorized actions. Regularly audit RBAC policies to ensure they align with organizational security requirements. #RBAC #NetworkSecurity #AccessControl #TechTips #Networking #LORSIVTechnologies By implementing RBAC for network devices, you can reduce the risk of unauthorized configuration changes, minimize the impact of human errors, and improve overall network security posture. Share your experiences or tag a colleague interested in implementing RBAC for enhanced access control! Follow #LORSIVTechnologies for more valuable network engineering tips and insights! #NetworkEngineer #Networking #ITInfrastructure #NetworkArchitecture #ITJobs #TechCareer #NetworkingJobs #TechSkills #Cisco #CCNA #CCNP #NetworkSecurity #RoutingAndSwitching #DataNetworking #NetworkAdmin #TechTalent #NetworkManagement #CyberSecurity #CloudNetworking #ITSecurity #NetworkMonitoring #WirelessNetworking #NetworkDesign #NetworkProtocols #Firewall #NetworkDeployment #InternetSecurity #NetworkingSolutions #NetworkEngineering #CareerGrowth #JobOpportunity #HiringNow #JobOpening #CareerDevelopment #ProfessionalDevelopment #JobSearch #TechRecruitment #CareerChange #TechJobs #NetworkingCommunity #TechIndustry #LinkedInJobs #LinkedInNetworking #LinkedInPost #LinkedInCareer #JobSearchTips #ResumeTips #InterviewTips #TechLife #LorsivTechnologies #NetworkingTools #NetworkingHardware #NetworkPerformance #NetworkSupport #DataCenterNetworking #LAN #WAN
To view or add a comment, sign in
-
Cyber security analyst | CAPv2 - The SecOps Group | CTI | CC | Threat analysis | vulnerability assessment | Cybersecurity
Created a roadmap for becoming a SOC analyst Level Up Your Networking Knowledge: Grasp core networking concepts like protocols (TCP/IP, UDP) and network security fundamentals. Resources: Online courses, certifications (CompTIA Security+) Build a Strong Security Foundation: Understand cybersecurity essentials: threats, vulnerabilities, and controls (firewalls, IDS/IPS). Explore popular operating systems (Windows, Linux, macOS) for security analysis. Sharpen Your Skills with Tools and Technologies: Certifications: Consider GIAC Security Essentials (GSEC) or SANS Security Essentials (SEC501). Master SIEM: Understand Security Information and Event Management systems. Hands-on Practice: Set up a home lab, participate in Capture the Flag (CTF) exercises. Land Your Dream SOC Analyst Job: Craft a Compelling Resume: Highlight skills, certifications, and hands-on projects. Network and Apply: Attend industry events, connect with professionals online. Continuous Learning: Stay updated with the latest threats and technologies. Bonus Tip: Develop soft skills like communication, teamwork, and problem-solving for SOC success. #SOC #SOCAnalyst #cybersecurity #cyberthreat #hacking
To view or add a comment, sign in
-
In August of 2022 I was hired on at Philomath SD as a Tech Specialist I, and 6 months later I was the sole #SysAdmin. We've had a pretty incredible journey over the past year, much of which was a direct response to cybersecurity threats. We were excited to share what we had learned at ACPE NW Rock IT 2024 at Skamania Lodge, but it looks like that might not be happening after all. Got our #ACPE tickets & hotel within a few minutes of registration opening. I was hoping we'd be able to present this year, but we have not heard back on our proposal... Then they cancelled our hotel reservations, after confirming over the phone it was sorted... Maybe next time. Just off the top of my head, in the past ~12 months with a team of 4 we : - Seamlessly migrated mid-year from #VMWare to #ProxMox. - Replaced our deprecated Tegile #NAS with an all-flash NVME machine running #TrueNAS (90% cost savings) - Deployed on-site & off-site web filtering for all #Chromebooks and #Laptops - Successfully deployed and enforced #2FA for all staff Email accounts. - Deployed PACE compliant #EDR A/V + Firewall (#Crowdstrike) for all workstations and servers. - Installed and implemented a #Meraki #firewall appliance at network edge. - Successfully transitioned from our old SIS to Synergy, with all major service functional on day 1 of school. (I worked a lot of weekends last summer...) - Implemented a Deployment/Inventory system (#PDQ), used to overcome #PrintNightmare restrictions by deploying printer drivers automatically among many other things - Enforced 2FA for all remote access. - Enforced 2FA for all Server access (including internal). - Completed an Active Directory restructure and complete Group Policy overhaul. - Complete #Google Workspace OU/Mail Group/Drive/GMail restructure & policy audit - Eliminated (nearly) all generic/shared accounts, including substitutes. - Negotiated and replaced MFPs with new Canon units, and integrated them securely with AD - Deployed internal IT documentation platform (#Bookstack) and documented all major process and procedure within. - Audited & collected all internal and external admin accounts, deployed internal Password & Secret management (#BitWarden) and associated policies. - Performed weekly security scans via our ESDs NESSUS scanner, and had weekly meetings with Cybersecurity experts. - Deployed LAPS, then new LAPS for all workstations, and break-glass local admin for servers. - Created separate tech accounts for Personal User, Workstation Admin, Server admin, and Domain Admin with permissions and login ability limited by GPO. - Enforced C:\ encryption via #BitLocker for all workstations - Upgraded and/or replaced all servers with #Windows Server 2016 or later. - Upgraded all Workstations with Windows 10 or later. There's much, much more and I hope we'll be able to share more about it soon but I have run out of characters.
To view or add a comment, sign in