Top 3 skills:
5-7 Years- Threat Detection, Event Monitoring, Log analysis and Correlation
5-7 years Network Security background( Designing networks, Route Swtich)
5-7 years Security Implementation controls- Authenticating, not designing and identifying
Day to Day operations- Even Monitoring,
Must have experience with 4 components of Security ( TVM, Forensic Analysis and investigation, Cyber security assessments, Cyber security awareness-- more details listed below)
Strong written and verbal communication skills
Experience with Incident Response and technical investigations
Wireshark experience- PCAP and NetFlow
Splunk Experience
Essential skills include experience with SIEM, Firewall Security Management, IPS, IDS, DLP, and WAF
Security event monitoring and analysis
Threat and vulnerability management
IDS/IPS alert monitoring and tuning
Malware analysis
Threat and vulnerability management duties include: Vulnerability scanning, root cause analysis, threat correlation, penetration testing, security log analysis.