Jobs

Software Development, Sales, Customer Support and more

Attention Employment Agencies, Recruiters, Headhunters:

Thank you for your interest in Milton Security Group, Inc. At this time, we are not accepting ANY unsolicited emails or referrals from ANY agency, recruiter or headhunter. All unsolicited resumes sent to any Milton Security Group, Inc email address, US Mail address or any other mailing or delivery service, will be considered property of Milton Security Group, Inc, deemed unsolicited, and will not be subject to ANY placement or referral fees. In addition, at this time we are not interested in hearing from ANY Agencies, Recruiters or Headhunters.

Attention Applicants:

No relocation benefits are offered. Do not submit a resume or information if you do not meet the minimum requirements. Due to the anticipated volume of resumes, we will only be able to respond to those applications that meet our current openings. Thank you for your interest. No phone calls, please.

CURRENT OPENINGS

IR Analyst Tier 1

To apply send your resume to jobs@miltonsecurity.com with the position desired in the subject line.

As a team member in the IR team for the Security Operations Center, you will assist in hunting for cyberattacks and threats on customer networks using log flows and threat feeds. Responsible for investigating and generating alerts and correction plans, using defined escalation paths and established processes, to help customers mitigate threats. You will assist customers in collecting and analyzing additional data round events to ensure customer is able to make an informed decision and aid the direction to be taken.

This includes monitoring network traffic and security event data, conducting proactive threat research and analysis, performing forensic investigation into incidents, and assist with the development of incident response processes and procedures for overall Security Operations Center development.

Respond to urgent or crisis situations within client network's to effectively mitigate threats through preparedness, response and recovery approaches, as needed, to maximize preservation of property and information. To investigate and analyze all relevant response activities.

RESPONSIBILITIES:

  • Responsible for Threat Hunting in customer data using tools.
  • Performs focused monitoring capabilities on a case-by-case basis.
  • Responsible for correlation between events and Suspicious Activity Reports (SAR's) from SOC analysts.
  • Responsible for writing Escalation Reports (ER's) and support tickets for each Milton Customer as needed.
  • Responsible for creating and maintenance of all Dashboards for all customers and how they should directly be used for hunting.
  • Responsible for daily use scripts analysts use and techniques for data analysis.
  • Reviewing/investigating/confirming SOC team submitted SARS, confirming which can be ignored and which are important and need escalation and presenting them to management. Explain to SOC team why SAR did not meet the escalation requirements.
  • Assist SOC analysts on efficient hunting, developing Suspicious Activity Reports (SARS) and the process of fully developing the argument of "why is this bad"
  • Create reports and data as requested by management and customers.
  • Creation of run-books for different types of attack, ensuring they are relevant through regular review and testing.
  • Actively track and solve assigned tickets in a timely fashion.
  • Assist with the development of training programs for SOC analysts as called upon.
  • Maintain historical records by documenting everything done.
  • Maintain customer confidence by keeping customer information confidential.
  • Collects data using a combination of standard intelligence methods and business processes.
  • Maintains current knowledge of relevant technologies and subject areas.
  • Participates in special projects and other duties as required.
  • Maintain compliance with all company policies and procedures.

BASIC QUALIFICATIONS:

  • 1+ Year experience as SOC Analyst or IR Handler
  • Excellent verbal and written communications skills, including ability to effectively communicate with internal and external customers and users
  • Experience in basic networking standards (OSI Model)
  • Experience in basic Linux/Unix/OSX and Windows management
  • Networking Technologies (TCP/IP, NFS, DNS, DHCP, Active Directory as examples)
  • Must be able to work under pressure, meet deadlines, while maintaining a positive attitude & providing exemplary service
  • Ability to work independently and carry out assignments to completion within parameters of instructions given, prescribed routines, and standard accepted practices
  • Ability to work in a team and carry out assignments to completion within parameters of instructions given, prescribed routines, and standard accepted practices
  • Degree in Network Administration or related field or industry standard certificates for network administration and security
  • Requires CSA+ certification at a minimum
  • Knowledge of intelligence community, military, U.S. government, Cyber organizations
  • Skills in open source data collection (OSINT) and acquisition such as investigating, researching, google hacking, etc.
  • Understand quantitative analysis, analytical methods, or data analysis
  • Experience with the development of custom tools in various coding languages to include SQL, Python, Perl, Ruby, Java, etc.
  • Experience with security tools such as Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various testing tools
  • Experience in exploiting web apps and web services security vulnerabilities
  • Demonstrated understanding of proxies, anonymizers, and capabilities such as TOR
  • Demonstrated an understanding of cyber technologies and techniques such as hashing reputation, heuristics, signatures, network traffic, and behavior analysis, predictive, prescriptive, and diagnostic analytics, machine learning, etc.
  • Understanding of malware analysis and reverse engineering techniques and tools (IDA, OllyDbg)
  • Continued education or training on new development technologies

Sales Development Representative (SDR)

To apply send your resume to jobs@miltonsecurity.com with the position desired in the subject line.

Milton Security Group Inc. is seeking a Sales Development Representative to join our team!

We are looking for highly motivated and intelligent sales professionals who are looking to grow their careers.

RESPONSIBILITIES:

  • Identify and qualify new sales opportunities for Milton Security Group Inc.
  • Demonstrate the value of our offering through phone calls, emails, and LinkedIn
  • Diligently update Pipedrive, our CRM, to stay current on leads and follow ups
  • Shadow Account Executives in meetings and other activities to help you acquire the skills you'll need for your career growth at Milton Security Group Inc.

BASIC QUALIFICATIONS:

  • 1+ years of experience in Sales Development, Lead Generation (Experience in B2B, high-tech industries preferred)
  • Positive and energetic phone skills, excellent listening ability, strong writing skills
  • Strong verbal selling skills over the phone and email
  • Proven success in lead generation and lead qualification
  • Experience and comfort prospecting via phone, email, mail and other new account development activities

SOC Analyst Tier 1

To apply send your resume to jobs@miltonsecurity.com with the position desired in the subject line.

As a team member in the SOC (Security Operations Center) Analyst will hunt for cyberattacks and threats on customer networks using log lows and threat feeds. Responsible for investigating and generating alerts using defined escalation paths and established processes to help customers mitigate threats.

This includes monitoring network traffic and security event data, conducting proactive threat research and analysis, performing forensic investigation into incidents, and assist with the development of incident response processes and procedures for overall Security Operations Center development.

RESPONSIBILITIES:

  • Monitor and analyze network traffic and security event data.
  • Investigate intrusion attempts and perform in-depth analysis of exploits.
  • Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident.
  • Conduct proactive cyber threat and compromise research and analysis.
  • Review security events that are populated in a Security Information and Event Management (SIEM) system.
  • Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the corrective or mitigation actions and escalation paths for each incident.
  • Independently follow procedures to document and report malicious activity.
  • Document all activities during an incident and providing leadership with status updates during the life cycle of the incident.
  • Create a final incident report detailing the events of the incident.
  • Provide analysis regarding intrusion events, security incidents, and other threat indications and warning information from various outside agencies.
  • Design and develop processes and procedures to improve incident response times, analysis of incidents, and overall process improvements and security infrastructure.
  • Participate in the review of security implications of new applications.
  • Contribute to the build of complete security solutions by integrating off-the-shelf and custom security tools through APIs and custom code.
  • Understand how to properly implement complex security solutions (such as Firewalls, VPN, and IDS/IPS solutions).
  • Foster and maintain good relationships with colleagues to meet expected customer service levels.
  • Absorb and adapt to new technologies quickly, and help to implement new solutions seamlessly.
  • Maintain contact with vendors, industry peers, and professional associations to keep informed of existing and evolving industry standards and technologies
  • Be available, on-call, to rapidly troubleshoot any problems resulting from infrastructure changes, security breaches, or other unplanned/unforeseen circumstances

BASIC QUALIFICATIONS:

  • Clear understanding of networking best practices and OSI model
  • Currently hold or be able to obtain one of the following certifications within 90 days of hire
    • Security+
    • CCNA
    • GSEC
    • CCNA Security
  • Able to work on a rotating shift schedule
  • Experience working in Linux, Windows, and OSX environments

SOC Analyst Tier 2

To apply send your resume to jobs@miltonsecurity.com with the position desired in the subject line.

As a team member in the SOC (Security Operations Center) Analyst will hunt for cyberattacks and threats on customer networks using log lows and threat feeds. Responsible for investigating and generating alerts using defined escalation paths and established processes to help customers mitigate threats.

This includes monitoring network traffic and security event data, conducting proactive threat research and analysis, performing forensic investigation into incidents, and assist with the development of incident response processes and procedures for overall Security Operations Center development.

RESPONSIBILITIES:

  • Monitor and analyze network traffic and security event data.
  • Investigate intrusion attempts and perform in-depth analysis of exploits.
  • Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident.
  • Conduct proactive cyber threat and compromise research and analysis.
  • Review security events that are populated in a Security Information and Event Management (SIEM) system.
  • Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the corrective or mitigation actions and escalation paths for each incident.
  • Independently follow procedures to document and report malicious activity.
  • Document all activities during an incident and providing leadership with status updates during the life cycle of the incident.
  • Create a final incident report detailing the events of the incident.
  • Provide analysis regarding intrusion events, security incidents, and other threat indications and warning information from various outside agencies.
  • Design and develop processes and procedures to improve incident response times, analysis of incidents, and overall process improvements and security infrastructure.
  • Participate in the review of security implications of new applications.
  • Contribute to the build of complete security solutions by integrating off-the-shelf and custom security tools through APIs and custom code.
  • Understand how to properly implement complex security solutions (such as Firewalls, VPN, and IDS/IPS solutions).
  • Foster and maintain good relationships with colleagues to meet expected customer service levels.
  • Absorb and adapt to new technologies quickly, and help to implement new solutions seamlessly.
  • Maintain contact with vendors, industry peers, and professional associations to keep informed of existing and evolving industry standards and technologies
  • Be available, on-call, to rapidly troubleshoot any problems resulting from infrastructure changes, security breaches, or other unplanned/unforeseen circumstances
  • Mentor and provide guidance to Tier 1 analysts.
  • Responsible for actions of Tier 1 analysts on shift with you.

BASIC QUALIFICATIONS:

  • Clear understanding of networking best practices and OSI model
  • Full understanding of Security Kill Chain
  • Currently holding two of the following certifications:
    • Security+
    • CCNA
    • GSEC
    • CCNA Security
  • In addition to above certifications, must also hold one of the following certifications:
    • CSA+
    • GCED
    • GISP
    • GIH
    • CASP
    • CCNP Security
    • GMON
  • Able to work on a rotating shift schedule
  • Experience working in Linux, Windows, and OSX environments
  • Minimum 1 year working as a Tier 1 Analyst or equivalent