Protect and Defend
Incident Response
United Kingdom
Dartford
Full Time
Part-Time $60 per hour
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats an`d vulnerabilities.
Knowledge of data backup and recovery.
Knowledge of network services and protocols interactions that provide network communications.
Knowledge of incident categories, incident responses, and timelines for responses.
Knowledge of incident response and handling methodologies.
Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
Knowledge of network traffic analysis methods.
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).
Knowledge of cloud service models and how those models can limit incident response.
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
Skill in preserving evidence integrity according to standard operating procedures or national standards.
Skill in securing network communications.
Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
Skill in using security event correlation tools.
Skill to design incident response for cloud service models.
Ability to design incident response for cloud service models.
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.