Hope you are doing well!
This is Arjun Shah from Savvy Technology Solutions LLC and I am recruiting
on behalf of our client in TEXAS. Please send me your available candidates
resume on this Email :arjun.s...@savvytech.us
Role : Security Analyst
Duration : 12 (Months)
Location : Austin TX 78752
Job Description : This position performs highly advanced (senior-level)
information security work specifically towards endpoint detection and response
(EDR) tools for the cybersecurity operations center (CSOC). EDR tools will
support incident-related search and investigation, suspicious activity
alert triage and validation, threat hunting, and stopping malicious activity.
The positon will be on-site for the planning, implementing, and monitoring
of an EDR tool.
The work involves the following:
• Responsible for the technical support for the administration of endpoint
security hardware and software to be deployed on mobile, laptops, desktop,
and server systems. (50%).
• Provides risk based configuration feedback about endpoint protection
that will result in configuration recommendations that ensure the protection
of information processed, stored or transmitted on servers, laptops, and
• Acts as consultant information liaison and subject matter expert (SME) to
various agency information technology departments (15%).
• Acts as a resource for direction, training and guidance for less experienced
This position requires high organizational skills, excellent written and verbal
communication skills, and a strong ability to produce technical documentation.
This position works under minimal supervision, with extensive latitude for
the use of initiative and independent judgment.
Requirements Minimum Skills Requirement in years
3 Ability to resolve complex security issues in diverse and
environments; to plan, develop, monitor, and maintain cybersecurity and
technology security processes and controls.
3 Evaluating network and system security configuration for best
and risk-based access controls.
3 Providing research, expert advice, and direction on tool
and implementation of market leaders within endpoint detection and response
(EDR) tools for the cybersecurity operations center (CSOC).
1 Performing live forensic analysis and security assessment on
endpoints to evaluate file system, process, network connections, registry,
and security events.
Preferred skill requirements in years
Malware reverse engineering software such OllyDbg, IDA Pro, or
Experience with writing computer system exploits, including fuzzing,
heap spraying, SEH overwrites, and ROP chaining and scripting in Python,
Perl, Ruby, bash, or equivalent: performing post-exploitation actions on
systems, including exfiltration, credential dumping, and persistence.
Savvy Technology Solutions LLC
You received this message because you are subscribed to the Google Groups
To unsubscribe from this group and stop receiving emails from it, send an email
To post to this group, send email to firstname.lastname@example.org.
Visit this group at https://groups.google.com/group/us_itgroups.
For more options, visit https://groups.google.com/d/optout.