What are the responsibilities and job description for the Technical Consultant - Threat Detection Response & Intelligence position at Snowrelic Inc?
Position: Technical Consultant - Threat Detection Response & Intelligence
No of position : 9
12 months
Dallas TX
Onsite
W2 only
Required Skills
OT Security Shift Lead (ONSITE DALLAS)
Bachelor’s Degree in Information Technology, Computer Science, Cybersecurity, or a related field required. Master's degree preferred.
Minimum of 5-7 years of experience in a cybersecurity-focused role; SOC experience strongly preferred.
3 years of direct experience working with Operational Technology (OT) / Industrial Control Systems (ICS) environments – including hands-on knowledge of SCADA systems, PLCs, RTUs, HMIs, and industrial networks.
Advanced certifications strongly desired. Examples include: CySA , CEH, OSCP, GICSP, CCNA Security, or relevant OT security certifications (e.g., ISA/IEC 62443).
Deep understanding of cybersecurity fundamentals such as networking protocols (TCP/IP, UDP, DNS), operating systems (Windows, Linux), and security architecture principles...
Cont...
Job Description Are
The Threat Detection, Response & Intelligence Consultant plays a vital role in safeguarding an organization's digital infrastructure by identifying, analyzing, and mitigating cyber threats. This position involves monitoring, prioritizing, investigating and responding to security incidents using a variety of cybersecurity tools, including SIEM, SOAR, EDR, and XDR platforms. The consultant is expected to understand and apply industry frameworks like MITRE ATT&CK and the Cyber Kill Chain to understand and counter adversary tactics effectively. Key responsibilities are conducting events investigation, managing incident report, and providing actionable recommendations and response to strengthen the clients security posture. The role also requires a deep understanding of network and endpoint events, as well as the ability to interpret security tools and logs from Windows, MAC, and Linux systems. The consultant will engage in vulnerability management and cyber threat intelligence activities, crucial for identifying and anticipating potential threats. Continuous learning and adaptation are essential to stay ahead of emerging threats and evolving technologies.
No of position : 9
12 months
Dallas TX
Onsite
W2 only
Required Skills
OT Security Shift Lead (ONSITE DALLAS)
Bachelor’s Degree in Information Technology, Computer Science, Cybersecurity, or a related field required. Master's degree preferred.
Minimum of 5-7 years of experience in a cybersecurity-focused role; SOC experience strongly preferred.
3 years of direct experience working with Operational Technology (OT) / Industrial Control Systems (ICS) environments – including hands-on knowledge of SCADA systems, PLCs, RTUs, HMIs, and industrial networks.
Advanced certifications strongly desired. Examples include: CySA , CEH, OSCP, GICSP, CCNA Security, or relevant OT security certifications (e.g., ISA/IEC 62443).
Deep understanding of cybersecurity fundamentals such as networking protocols (TCP/IP, UDP, DNS), operating systems (Windows, Linux), and security architecture principles...
Cont...
Job Description Are
The Threat Detection, Response & Intelligence Consultant plays a vital role in safeguarding an organization's digital infrastructure by identifying, analyzing, and mitigating cyber threats. This position involves monitoring, prioritizing, investigating and responding to security incidents using a variety of cybersecurity tools, including SIEM, SOAR, EDR, and XDR platforms. The consultant is expected to understand and apply industry frameworks like MITRE ATT&CK and the Cyber Kill Chain to understand and counter adversary tactics effectively. Key responsibilities are conducting events investigation, managing incident report, and providing actionable recommendations and response to strengthen the clients security posture. The role also requires a deep understanding of network and endpoint events, as well as the ability to interpret security tools and logs from Windows, MAC, and Linux systems. The consultant will engage in vulnerability management and cyber threat intelligence activities, crucial for identifying and anticipating potential threats. Continuous learning and adaptation are essential to stay ahead of emerging threats and evolving technologies.