This full-time Security Analyst position within the KGS MDR Team is focused on leading incident response, threat analysis, and forensic investigations. The role involves identifying and mitigating advanced threats, supporting SOC operations, and developing processes to improve security posture. Specialization in OT and ICS security is highly valued.
Requirements
- 8+ years in Information Security, System Administration, or Network Engineering
- 5–6 years in Incident Response and 3–5 years with SIEM tools (e.g., Microsoft Sentinel, Splunk, LogRhythm, Chronicle)
- Experience with vulnerability/penetration testing tools (e.g., Metasploit, Kali Linux, Nmap)
- Understanding of SIEM solution design and configuration
- Strong analytical, communication, and client-facing skills
- Advanced scripting (PowerShell, Bash, Cisco IOS.sh, Perl, Lua, etc.)
- Deep understanding of TCP/IP, OSI Model, and network protocols
- Malware analysis and reverse engineering techniques
- Windows and Unix-based systems architecture knowledge