Hiring Now : : Sr. Incident Response Analyst. : : Hybrid (CA) at San Francisco, California, USA |
Email: [email protected] |
From: Surya kanta pradhan, Vyze inc. [email protected] Reply to: [email protected] Job Title: Sr. Incident Response Analyst. Location: San Francisco ,Ca Hybrid Project Length: 6-months Customer Time Zone: PST Role Requirements: Utilize understanding of attack signatures, tactics, techniques and procedures associated with advanced threats. Lead investigate, coordinate, bring to resolution, and report on security incidents as they are escalated or identified Supervision over the DFIR Incident Handler/Analyst Team Forensically analyze end user systems and servers found to have possible indicators of compromise Provide engineering and administrative functions for all tools in support of the DFIR mission Complete complex analysis of artifacts collected during a security incident/forensic analysis Identify security incidents through Hunting operations within a SIEM and other relevant tools and partner organizations/technologies Interface and communicate with server owners, system custodians, and IT contacts to pursue security incident response activities, including obtaining access to systems, digital artifact collection, and containment and/or remediation actions Provide expert consultation and forensic analysis on security incidents Maintain, manage, improve and update the system forensics process and protocol documentation Regularly provide reporting and metrics on case work Provide SME level resolution of security incidents by identifying root cause and solutions through forensic analysis Analyze results in investigative matters, and develop fact-based reports Qualifications: Several years of experience serving in a senior cybersecurity analyst and incident response role or supervisory role within a large enterprise SOC Expert-level understanding and experience in the practical application of the Incident Response Lifecycle and associated best practices Understanding of network and host-based forensic methodologies Experience with and demonstrated knowledge of enterprise-grade security technologies and capabilities to include Security Information and Event Management (SIEM), log management and search, incident case management, intrusion detection/prevention systems, antivirus, full packet capture, data loss prevention (DLP), firewall, web proxy, user/endpoint behavior analytics (UEBA) Advanced knowledge of IT security standards and frameworks (e.g., MITRE ATT&CK ) Understanding of the current threat landscape and adversary tactic, techniques and procedures (TTP's) Demonstrated knowledge of information security programs and operations, and data security practices and procedures, including risk identification/assessment Strong problem solving and critical thinking abilities Ability to drive continuous process improvement and excellence Excellent verbal and written communication skills to include the ability convey technical details in a clear and understandable manner to both, technical and non-technical audiences alike The ability to foster teamwork and collaboration across operational teams Keywords: information technology California |
[email protected] View all |
Wed Feb 14 03:54:00 UTC 2024 |