fbpx

Careers

Join Us

Open positions at SecurIT360.

For inquiries and resume submissions contact Misty Stacy at mstacy@securit360.com

POSITION: Information Security Analyst

DURATION: Full-Time

LOCATION: Birmingham, AL/ Kansas City, MO/ Remote/ Part time Remote

SALARY: Negotiable (depending on level of experience)

***To be noted regarding working hours, this position requires shift work- Shifts are rotated every 3-6 months and hours are typically as follows:

First, Second & Third Shift • 1st Shift may start anywhere between 7am to 10am and end anywhere between 4pm and 7pm. • 2nd shift may start at 2pm or 2:30pm and end at 10pm or 10:30pm • 3rd Shift hours are 10pm to 8am

JOB SUMMARY: This role is responsible for the support and monitoring of our various ticketing systems and handles events from our MDR (Managed Detection & Response) & EDR (Endpoint Detection & Response) Systems.

JOB SKILLS:

• Provide exceptional and professional customer service to our clients

• Log all client contacts using Microsoft Teams and OS Ticket.

• Research incidents and analyze log files

• Reference and update internal Knowledge Base for known issues

• Escalate issues, situations, or problems requiring urgent attention to Level II Analysts and Team Leads • Collaborate effectively with other service desk team members to resolve and document issues

• Participate in ongoing training for IT operations

• Work on projects or tasks assigned by supervisors

SUPERVISION:

SUPERVISED BY: SOC Manager

SUPERVISES: None

TRAVEL:

Limited travel as needed

JOB QUALIFICATIONS:

REQUIRED: High School Diploma or Equivalent

DESIRED: Currently working toward a degree in the IT or Security fields Associates degree in information technology field Bachelors degree in information technology field

• Background in a Help Desk environment tiers 1 & 2. At least 1-year experience in a customer service and technical role

• Working knowledge of IT Infrastructure, Business Applications, and Help Desk technology

LICENSES, CERTIFICATIONS, AND/OR REGISTRATIONS:

Current Driver’s License and Current automobile liability insurance.

ADDITIONAL SKILLS: Experience in oral and written communication including analysis, preparation and report presentation. Must have ability to communicate, motivate, and organize projects among a broad spectrum of personnel, frequently under deadline pressure. Knowledge of personal computers and PC application and development software desired.

PERSONAL TRAITS, QUALITIES, AND APTITUDES:

Organized and capable of managing time effectively.

Able to work independently and excise sound judgment.

Ability to effectively communicate with staff at all levels.

Ability to manage multiple priorities, frequently under stressful deadlines.

PHYSICAL REQUIREMENTS:

Must be able to perform full-range sedentary work requiring sitting, walking, and standing.

Must be able to perform limited range heavy work requiring sitting, standing, walking, and driving a vehicle.

Must possess vision, hearing, feeling, physical strength and dexterity necessary to perform all the duties of a SIEM Sales Engineer.

Must be able to communicate effectively both orally and in writing. Must be able to give and receive instructions and information, both in person and via telephone.

Work requires exerting force of up to 100 pounds occasionally, and/or up to 50 pounds frequently, and/or up to 20 pounds constantly in moving objects or materials.

OTHER DUTIES:

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.

 

Position: Account Manager (Inside Sales) 

Duration: Direct Hire

Description 

We are currently searching for an experienced Cybersecurity Account Manager to join our growing sales team. This candidate will be responsible for maintaining existing client relationships while continuing to effectively articulating the value of SecurIT360’s services to its customers, promoting additional services as needed. 

Job Requirements 

  • Bachelor’s degree; preferably in business or computer science 
  • Experience with inside sales 
  • Minimum of 3 years in technical sales; preferably cyber security or related consulting services 
  • Experience working with/selling to C level and IT Executives
  • Experience using Microsoft Dynamics or CRM
  • Proficient in MS Office Suite  
  • Excellent interpersonal, verbal, and written communication skills 
  • Possess high technical acumen with the ability to relate it with business value 
  • Excellent qualifying and closing skills 
  • Experience discussing solutions in both IT and OT based cyber security best practices and standards is a plus 
  • Knowledge of NERC CIP, NIST, or ISA regulations is a plus 

Position: Incident Responder

Duration: Direct Hire

Location: Birmingham, AL 35209 or Kansas City, MO 64110

Salary: Negotiable

RESPONSIBILITIES

· Solve challenging and complex problems, assisting with the technical aspects of DFIR investigations, and utilizing creativity and adaptability to perform the most advanced and mission-critical assessments

· Expected to constantly evolve in response to emerging threats and diverse client needs while adapting to the rapidly changing environment

· Operate as a technical resource within the Practice and actively participate in DFIR investigations including but not limited to: Incident Response and Forensic investigations, Threat Discovery Engagements, Tabletop Exercises, and IR Retainer escalations

· Effective engagement communication, time management, and collaboration with peers

· Author comprehensive engagement deliverables that are proficiently tailored to both technical and managerial audiences and fully detail the technical findings, deficiencies, business impact, and realistic remediation strategies

· Utilize automation, orchestration, and scripting to reduce manual processes, improving overall efficiency while also enabling new capabilities to meet the rapidly changing needs of our clients

· Perpetually strengthen relevant skills, knowledge, and abilities to stay at the forefront of the information security industry

· Foster client relationships by providing support, information, and guidance

· Maintain a strong desire to learn, adapt, and improve along with a rapidly-growing company

· Perform other duties as assigned

REQUIREMENTS

· Minimum of two (2) years of experience delivering incident response-related consulting services

· Minimum of one (1) years of experience in an enterprise-level consulting services role

· Over four (4+) combined years of IT and information security experience are strongly preferred

· Experience with standard Incident Response methodology and process

· Core capabilities including network traffic analysis, host forensics, malware handling/triage, log review

· Experience with a variety of industry-related solutions including EDR, SIEM, NDR, FW, NGAV, Velociraptor, OSQuery/Kolide, and other tools preferred

· Experience with database querying and analysis preferred

· Experience with common scripting languages including PowerShell, Python, BASH, Go, and others

· Base knowledge of service offerings in AWS and Azure

· Awareness of attacker techniques, advanced threat groups, and integration of intelligence into an investigation

· Other relevant industry certifications, such as GCIA, GCIH, GDAT, GCFE, and GFCA

· Internal operational (non-consulting) experience is strongly preferred

Position: Cyber Forensics Analyst I (Computer Forensics)

Duration: Direct Hire

Location: Birmingham, AL 35209 or Kansas City, MO 64110

RESPONSIBILITIES

· Provide advisement and expertise to the Incident Response technical processes and procedures

· Complete specific deliverables in the areas of threat analysis, data mining/business-intelligence foundations, network security analysis, and ingestion of multiple data sources to provide visibility to the organization

· Collaborate with inter-departmental teams in order to determine and provide impact analysis for business services related to IT systems, information, and critical infrastructure

· Correlate security, vulnerability, and exploit information to create actionable reporting to be delivered to incident response and technical staff

· Participate in documenting and publishing security related workflows and procedures

REQUIREMENTS

· Bachelor’s in Science, Technology, Engineering, or Mathematics (STEM) AND 4 years of experience in networks or systems security or in lieu of a degree 8+ additional years directly related work experience is required.

· Experience with Incident Response and remediation

· Experience with system security utilities and supporting tools (SOAR, SIEM, forensics tools, etc.)

· Experience with process streamlining with IT solutions for security related processes.

· Experience with the processes Security Operations, Cyber Threat Intel, and Incident Response and related tools

· Experience with analytical security tools to define and provide threat and / or investigative information for active / real time support to the business

· Experience of authorization methodologies, authentication technologies, and security attack pathologies

Preferred Skills:

· Strong communication skills – oral, written and presentation.

· Must be able to work effectively as part of an inter-organizational team as well as an individual contributor

· Ability to rapidly generate security related content in MS Office formats (documents, spreadsheets, presentations, process flows, web content) that is targeted and comprehensible at all corporate organization levels

· Information Security certifications (GIAC, SANS, CISSP)

· Experience operating security tools in an operational environment

· Experience conducting Incident Response

· Experience with security artifacts as they relate to RMF, IRAMP, DIACAP or NIST

· Knowledge of system administration, incident response and information system registration

· Knowledge of databases and information systems design and development

Position: Cyber Forensics Analyst II (Computer Forensics)

Duration: Direct Hire

Location: Birmingham, AL 35209 or Kansas City, MO 64110

Salary: Negotiable

RESPONSIBILITIES

· Provide advisement and expertise to the Incident Response technical processes and procedures

· Complete specific deliverables in the areas of threat analysis, data mining/business-intelligence foundations, network security analysis, and ingestion of multiple data sources to provide visibility to the organization

· Collaborate with inter-departmental teams in order to determine and provide impact analysis for business services related to IT systems, information, and critical infrastructure

· Correlate security, vulnerability, and exploit information to create actionable reporting to be delivered to incident response and technical staff

· Participate in documenting and publishing security related workflows and procedures

REQUIREMENTS

· Bachelor’s in Science, Technology, Engineering, or Mathematics (STEM) AND 5-6 years of experience in networks or systems security or in lieu of a degree 8+ additional years directly related work experience is required.

· Experience with Incident Response and remediation

· Experience with system security utilities and supporting tools (SOAR, SIEM, forensics tools, etc.)

· Experience with process streamlining with IT solutions for security related processes.

· Experience with the processes Security Operations, Cyber Threat Intel, and Incident Response and related tools

· Experience with analytical security tools to define and provide threat and / or investigative information for active / real time support to the business

· Experience of authorization methodologies, authentication technologies, and security attack pathologies

Preferred Skills:

· Strong communication skills – oral, written and presentation.

· Must be able to work effectively as part of an inter-organizational team as well as an individual contributor

· Ability to rapidly generate security related content in MS Office formats (documents, spreadsheets, presentations, process flows, web content) that is targeted and comprehensible at all corporate organization levels

· Information Security certifications (GIAC, SANS, CISSP)

· Experience operating security tools in an operational environment

· Experience conducting Incident Response

· Experience with security artifacts as they relate to RMF, IRAMP, DIACAP or NIST

· Knowledge of system administration, incident response and information system registration

· Knowledge of databases and information systems design and development

For inquiries and resume submissions contact Misty Stacy at mstacy@securit360.com

Mailing Address

530 Beacon Pkwy W, #901
Birmingham, AL 35209, USA