Analyze data feeds for event detection, and perform correlation analysis on data from multiple monitoring sources.
Analyze data, perform research, and verify information for potential misconduct or abnormal behavior.
Respond to cybersecurity events and incidents caused by internal and external threats, coordinate response activities with various stakeholders for confirmed incidents, and recommend mitigation strategies. This can involve non-traditional working hours.
Proactively hunt within Gemini’s environment utilizing a variety of tools and techniques
Triage emerging threats to protect assets and information.
Produce forensic imaging and coordinate evidence collection for investigations.
Utilize data mining tools to collect, search, sort, and organize large amounts of information.
Research, address, and resolve security-related events.
Partner with cross-functional technical teams to share expertise, research threats, and implement solutions.
Produce reports, summaries, and other forms of communication that may be both internal and client facing, to include leadership and executive management.
Draft root cause analysis reports and recommendations after cybersecurity incidents.
Identify risk areas that will require vulnerability prevention
Stay current with Security technologies and make recommendations for use based on business value
3+ years of network security analysis, operational or engineering experience.
Operations in MacOS and Linux environments
Coding, scripting or automation experience (Python, Go, Ruby, Java)