Home

Hiring Now : : Sr. Incident Response Analyst. : : Hybrid (CA) at San Francisco, California, USA
Email: [email protected]
From:

Surya kanta pradhan,

Vyze inc.

[email protected]

Reply to:   [email protected]

Job Title: Sr. Incident Response Analyst.

Location:  San Francisco ,Ca Hybrid 

Project Length: 6-months 

Customer Time Zone: PST

Role Requirements: 
Utilize understanding of attack signatures, tactics, techniques and procedures associated with advanced threats.  
Lead investigate, coordinate, bring to resolution, and report on security incidents as they are escalated or identified
Supervision over the DFIR Incident Handler/Analyst Team
Forensically analyze end user systems and servers found to have possible indicators of compromise
Provide engineering and administrative functions for all tools in support of the DFIR mission
Complete complex analysis of artifacts collected during a security incident/forensic analysis
Identify security incidents through Hunting operations within a SIEM and other relevant tools and partner organizations/technologies
Interface and communicate with server owners, system custodians, and IT contacts to pursue security incident response activities, including obtaining access to systems, digital artifact collection, and containment and/or remediation actions
Provide expert consultation and forensic analysis on security incidents
Maintain, manage, improve and update the system forensics process and protocol documentation
Regularly provide reporting and metrics on case work
Provide SME level resolution of security incidents by identifying root cause and solutions through forensic analysis
Analyze results in investigative matters, and develop fact-based reports

Qualifications:
Several years of experience serving in a senior cybersecurity analyst and incident response role or supervisory role within a large enterprise SOC
Expert-level understanding and experience in the practical application of the Incident Response Lifecycle and associated best practices
Understanding of network and host-based forensic methodologies
Experience with and demonstrated knowledge of enterprise-grade security technologies and capabilities to include Security Information and Event Management (SIEM), log management and search, incident case management, intrusion detection/prevention systems, antivirus, full packet capture, data loss prevention (DLP), firewall, web proxy, user/endpoint behavior analytics (UEBA)
Advanced knowledge of IT security standards and frameworks (e.g., MITRE ATT&CK ) 
Understanding of the current threat landscape and adversary tactic, techniques and procedures (TTP's)
Demonstrated knowledge of information security programs and operations, and data security practices and procedures, including risk identification/assessment
Strong problem solving and critical thinking abilities
Ability to drive continuous process improvement and excellence
Excellent verbal and written communication skills to include the ability convey technical details in a clear and understandable manner to both, technical and non-technical audiences alike
The ability to foster teamwork and collaboration across operational teams

Keywords: information technology California
[email protected]
View all
Wed Feb 14 03:54:00 UTC 2024

To remove this job post send "job_kill 1116901" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 8

Location: San Francisco, California