Exatech Inc is a staffing and recruiting company.
5 Monitors and analyzes Cyber Security alerts from Cyber Security tools, network devices, and information systems.
5 Monitors and maintains Cyber Security infrastructure and/or policies and procedures to protect information systems from unauthorized use.
5 Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.
5 Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain Cyber Security and information technology security processes and controls; to communicate effectively.
5 Evaluates network and system security configuration for best practices and risk-based access controls.
3 Researches and implements new security risk and mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches.
3 Performs forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.
3 Experience with writing computer system exploits, including fuzzing, heap spraying, SEH overwrites, and ROP chaining and scripting in Python, PowerShell, Perl, Ruby, bash, or equivalent: performing post-exploitation actions on compromised systems, including exfiltration, credential dumping, and persistence."