Avertium Logo

Avertium

CyberSecurity Specialist

Posted Yesterday
Remote
Hiring Remotely in USA
Entry level
Remote
Hiring Remotely in USA
Entry level
As a Cyber Security Specialist, monitor and respond to security incidents, utilize SOC tools, assist in incident investigations, and document findings.
The summary above was generated by AI
Avertium is a cyber fusion and MXDR leader, delivering comprehensive security and compliance services to mid-market and enterprise customers. Our unique “Assess, Design, Protect” methodology addresses and improves security strategy, reduces attack surface risk, strengthens compliance, and provides continuous threat protection. Avertium maximizes customer security investments and enables customers to focus on growth, innovation, and business outcomes, while assuring that their security infrastructure is resilient and adaptive to evolving threats. That’s why customers trust Avertium to deliver better security, improved compliance, and greater ROI. 

As a Cyber Security Specialist, this role supports 24x7 monitoring and response operations by identifying, validating, and escalating potential security incidents. Working as an active member of the Security Operations Center (SOC), the specialist uses SIEM, IDS/IPS, and endpoint detection tools to distinguish between benign activity and legitimate threats, ensuring accurate triage and timely containment actions. 

The specialist performs initial investigations, reviews vulnerability findings, and assists with remediation verification to strengthen client environments. They contribute to trend analysis, help refine detection logic, and collaborate with senior analysts and engineering teams to improve SOC workflows and alert fidelity. 

This position is ideal for those with foundational cybersecurity experience who are ready to apply their technical skills, analytical thinking, and professional judgment in a fast-paced environment. The specialist is expected to document findings clearly, follow established playbooks, and proactively stay informed about emerging threats and evolving security technologies while growing toward independent investigation responsibilities. 

Knowledge, Skills and Abilities:

  • Foundational Cybersecurity Knowledge - Demonstrates working knowledge of cybersecurity fundamentals, including confidentiality, integrity, and availability (CIA); access control concepts; and defense-in-depth strategies. Recognizes common attack types, tactics, and vulnerabilities, and applies this understanding to alert validation and triage. 

  • Networking and Operating System Fundamentals - Understands how core network protocols (TCP/IP, DNS, HTTP, etc.) and the OSI model relate to system communications. Utilizes this knowledge to identify abnormal network traffic and system behavior. Operates comfortably in multiple OS environments and interprets basic system and event logs. 

  • Security Tools and Technologies - Proficiently operates standard SOC monitoring tools such as SIEM, IDS/IPS, and EDR platforms. Collects, reviews, and interprets logs for indications of compromise. Uses vulnerability scanners and antivirus platforms to identify and verify potential risks. 

  • Cyber Defense and Detection Concepts - Applies detection methodologies to identify and validate anomalies and potential intrusions. Understands signature-based and behavioral detection models, and supports tuning or rule enhancement activities by providing relevant observations. 

  • Incident Response Awareness - Executes standard triage and response actions during security incidents in accordance with defined playbooks. Documents case findings accurately and escalates as appropriate based on impact and scope. 

  • Risk and Compliance Fundamentals - Recognizes how risk management and compliance frameworks (ISO, HIPAA, PCI DSS) apply to SOC operations. Identifies and reports deviations from policies or standards and participates in routine evidence gathering. 

  • Cryptography and Data Protection - Understands core encryption and key management principles, including proper handling of sensitive data. Applies privacy standards when managing logs or data that include PII, PHI, or PCI information. 

  • Analytical and Problem-Solving Skills - Analyzes event data to determine patterns and relationships between security alerts. Applies logical reasoning and investigative methodology to identify root causes and assist with containment or remediation. 

  • Communication and Documentation Skills - Produces clear, concise, and accurate documentation within ticketing and reporting systems. Communicates technical findings effectively to peers and supervisors, ensuring continuity of investigations across shifts. 

  • Professional and Ethical Conduct - Adheres to Avertium and client security policies, confidentiality agreements, and data handling standards. Models responsible cyber hygiene and professional integrity in all actions and communications. 

  • Continuous Learning and Adaptability - Pursues ongoing development through internal training, certifications, and peer mentorship. Actively incorporates feedback from senior analysts to improve analytical efficiency and technical acumen. 

Certifications:

  • Required (or be able to obtain): Microsoft SC200, Sentinel 1 SIREN 
  • Desirable: Microsoft AZ500  
  • Example additional considerations or equivalents such as (not all inclusive):  A+/Network+, CCT, DFE, CSA, GISF, ECSS 

Top Skills

Edr
Ids
Ips
Microsoft Az500
Microsoft Sc200
Sentinel 1 Siren
SIEM

Similar Jobs

14 Days Ago
Remote
USA
170K-200K Annually
Senior level
170K-200K Annually
Senior level
Software • Defense
The role involves maintaining cybersecurity compliance documentation, coordinating assessments and audits, and advising on regulatory changes, while also managing vendor risks and promoting cybersecurity awareness.
Top Skills: Cloud Security StandardsCmmc 2.0FedrampGrc PlatformsIso 27001Nist 800-171Soc 2
13 Minutes Ago
Easy Apply
Remote or Hybrid
US
Easy Apply
Mid level
Mid level
Artificial Intelligence • Machine Learning
The Customer Success Manager will maintain relationships with clients, ensure satisfaction, drive revenue generation, and support Domino Cloud adoption.
Top Skills: AIClouderaCrm ToolsDatabricksDockerGoogleKubernetesMlSaaSSagemakerSASSFDC
31 Minutes Ago
Remote or Hybrid
Chicago, IL, USA
Senior level
Senior level
Enterprise Web • Logistics • Mobile • Software • Energy • Utilities
The DevOps Engineer develops and maintains infrastructure, improving CI/CD pipelines, and ensures high availability, automation, and performance of systems.
Top Skills: AWSAws CodepipelineBashDockerGitGroovyJenkinsPythonTerraform

What you need to know about the Charlotte Tech Scene

Ranked among the hottest tech cities in 2024 by CompTIA, Charlotte is quickly cementing its place as a major U.S. tech hub. Home to more than 90,000 tech workers, the city’s ecosystem is primed for continued growth, fueled by billions in annual funding from heavyweights like Microsoft and RevTech Labs, which has created thousands of fintech jobs and made the city a go-to for tech pros looking for their next big opportunity.

Key Facts About Charlotte Tech

  • Number of Tech Workers: 90,859; 6.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Lowe’s, Bank of America, TIAA, Microsoft, Honeywell
  • Key Industries: Fintech, artificial intelligence, cybersecurity, cloud computing, e-commerce
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (CED)
  • Notable Investors: Microsoft, Google, Falfurrias Management Partners, RevTech Labs Foundation
  • Research Centers and Universities: University of North Carolina at Charlotte, Northeastern University, North Carolina Research Campus

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account