Utilize advanced technical background and experience to scrutinize and provide corrective analysis to escalated cyber security events from Tier 1 & 2 analysts distinguishing these events from benign activities and escalating confirmed incidents to the Incident Response Lead.
Provide in-depth cyber security analysis, and trending/correlation of large datasets such as logs, event data, and alerts from diverse network devices and applications within the enterprise to identify and troubleshoot
specific cyber security incidents and make informed technical recommendations that enable remediation efficiently.
Proactively search through log, network, and system data to find and identify undetected threats.
Identify and ingest indicators of compromise (IOC\'s) (e.g., malicious IPs/URLs, etc.) into network security tools/applications to protect the clients network.
Quality-proof technical advisories and assessments prior to release from SOC.
Coordinate with and provide expert technical support to enterprise-wide technicians and staff to resolve confirmed incidents.
Report common and repeat problems, observed via trend analysis, to SOC management and propose process and technical improvements to improve the effectiveness and efficiency of alert notification and incident handling.
Formulate technical best-practice SOPs and Runbooks for SOC Analysts.
Respond to inbound requests via phone and other electronic means for technical assistance and resolve problems independently. Coordinate escalations with Service Delivery Lead and collaborate with internal technology teams to ensure timely resolution of issues.
Identifies, reports, and resolves security violations.
Skills and Qualifications:
At least 3-5 years of demonstrated operational experience as a cyber security analyst/engineer handling cyber security incidents and response in critical environments, and/or equivalent knowledge in areas such as: technical incident handling and analysis, intrusion detection, log analysis, penetration testing, vulnerability management
In-depth understanding of: current cyber security threats, attacks and countermeasures for adversarial activities such as network probing and scanning, distributed denial of service (DDoS), phishing, ransomware, botnets, command and control (C2) activity, etc.
In-depth hands-on experience analyzing and responding to security events and incidents with most of the following technologies and/or techniques: security information and event management, (SIEM) technologies, intrusion detection/prevention systems (IDS/IPS), network and host-based firewalls, network access control (NAC), data leak protection (DLP), database activity monitoring (DAM), web and email content filtering, vulnerability scanning tools, endpoint protection, secure coding, etc.
Strong communication, interpersonal, organizational, oral, and customer service skills.
Strong knowledge of TCP/IP protocols, services, and networking.
Knowledge of forensic analysis techniques for common operating systems.
Adept at proactive search, solicitation, and detailed analysis of threat intelligence (e.g., exploits, IOCs, hacking tools, vulnerabilities, threat actor TTPs) derived from open-source resources and external entities, to identify cyber security threats and derive countermeasures, not previously ingested into network security tools/applications (external & internal threat hunting)
Excellent ability to multi-task, prioritize, and manage time and tasks effectively.
Ability to work effectively in stressful situations.
Strong attention to detail.
Strong understanding of command line scripting and implementation (i.e., Python, PowerShell, Bash Shell)
Ability to write new content/searches/scripts (e.g., Splunk dashboards, Splunk ES alerts, QRadar, RSA Netwitness, SumoLogic, etc.)
Experience with tools such as Active Directory, Cisco IOS, MS Server, AMP, Splunk ES, SNORT, Yara, IronPort, and Firepower.
Strong understanding of networking (TCP Flags, TCP Handshake, IP addressing, Firewalls, Proxy, IDS, IPS)
Ability to perform NetFlow / packet capture (PCAP) analysis
Information Technology security related certifications such as but not limited to: CompTIA A+, Network+, Security+, Linux related certifications, Cisco CCNA, Microsoft Certified Azure Fundamentals, AWS Cloud Practitioner
Preferred Skills:
Certification desired - SANS GCIA, GCED, GPEN, GCIH or similar industry
Experience working with or in any of the following
Computer Incident Response Team CIRT
Computer Emergency Response Team CERT
Computer Security Incident Response Center CSIRC
Degree in Computer Science, Information Security or similar discipline
Beware of fraud agents! do not pay money to get a job
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.