IBM

IBM

0 Evaluaciones

8 días
Expira 06/07/2025

Security Consultant

Security Consultant

Introduction

Implementation and operation of Deception (Honeypot) for Cybersecurity Services.

Your Role And Responsibilities

Security Consultant - Resources needed to operate the implementation of deception.

Preferred Education

Bachelor's Degree

Required Technical And Professional Expertise

  • Cybersecurity and Network Security:
  • Knowledge of network protocols (TCP/IP, UDP, DNS, etc.).
  • Configuration and monitoring of firewalls, IDS/IPS systems, and proxies.
  • Skills in performing network forensics and detecting malicious activity.
  • Familiarity with cybersecurity frameworks such as MITRE ATT&CK.
  • Honeypots Administration and Configuration.
  • Experience with honeypot tools and platforms.
  • Ability to configure honeypots according to the most critical assets of the enterprise.
  • Knowledge of creating high and low interaction honeypots.
  • Ability to integrate honeypots with systems without affecting the operation.
  • Interpretation of logs generated by honeypots to identify attack patterns.
  • Configuration of honeypots in cloud platforms such as AWS, Azure, or Google Cloud.
  • Threat Analysis and Incident Response:
  • Skills in analyzing data captured by the honeypot and extracting useful information about attack vectors.
  • Experience in incident management and creating mitigation strategies based on honeypot findings.
  • Handling of Threat Intelligence and data correlation tools (SIEMs QRadar).
  • Automation and Programming:
  • Knowledge in languages such as Python to customize and automate honeypots.
  • Simulation and Testing:
  • Knowledge in attack simulation (network teaming) to test the effectiveness of the honeypot.

Preferred Technical And Professional Experience

Keep up to date with the latest trends and threats in cybersecurity.

  • Knowledge of security standards: Familiarity with security standards such as CIS.
  • Willingness to learn new analysis tools and methodologies as technologies and threats evolve.
  • English Language.