Home

Cyber Security Consultant || Minneapolis, MN (Hybrid) Need local only with DL || Visa: USC/GC at Minneapolis, Minnesota, USA
Email: [email protected]
Hi,

Hope you are doing great! Please find the requirement below , If you find yourself comfortable with the requirement please reply back with your updated resume and I will get back to you or I would
really appreciate if you can give me a call back at my contact number
(302)-485-1559

Share only local consultant of MN with DL with

CISSP Certification and USC and GC only

Position: Cyber Security Consultant 

Location: Minneapolis, MN (Hybrid) Need local only with DL

Duration: 12+ Months

Experience: 8 Years

Visa: USC/GC

Position Purpose 

This individual contributor position plays a key role in shaping and maturing Sleep Numbers cybersecurity operations (SOC), cyber investigations, and incident response strategy by leading the Security Operations, Cyber Investigations
and Incident Response capability within Sleep Numbers Information Security organization, including closely overseeing third party-managed services. This role possesses an elevated level of communication and relationship-building acumen (all audiences, including
executives and non-technical stakeholders), a strong technical background, and deep field-relevant experience. 

Primary Responsibilities 

Develop and implement strategies to enhance the SOC's effectiveness, threat detection, and incident response capabilities with other technology teams. 
Provide coaching and feedback to third party security operations staff (responsible for level 1-2) and account manager(s). Ensure KPIs are maintained. Escalate non-compliance to contractual agreement(s). 
Lead development and maintenance of quality SOC playbooks (direct third-party team and contribute as needed). 
In the event of a cyber incident, will execute CSIRT (Cyber Security Incident Response Team) playbooks as Cyber Incident Commander which includes adhering directly to CSIRT playbooks and navigating the event(s)
with confidence which includes VP+ level executives and mobilizing cross-functional teams. 
Lead cybersecurity investigations and incident handling activities and coordinate with other in-house experts based on the nature of the event, notable or incident. 
Develop and conduct incident response tabletop exercises and simulations at least twice annually (may or may not include engaging a third party to conduct the exercise) 
Analyze security incidents to identify root causes and recommend and/or implement corrective actions. 
Develop and implement threat detection and monitoring strategies in partnership with platform owners who may reside on other teams across the company. 
Communicate effectively and confidently with executive leadership (VP and above) on the status of cybersecurity operations and incidents.  
Partner closely with security engineers and other technology teams to advise and help implement improvements to detections, monitoring platforms and workflow platforms. 
Provide regular updates and reports to senior management and relevant stakeholders. 
Drive prioritization and ownership of improvements needed in alignment with overall cybersecurity and technology strategies, make thoughtful recommendations to leadership and when required, make well-crafted
pitches for resources, technologies. 

Key Performance Indicators 

Hold security operations partner(s) held accountable to KPIs outlined as part of contractual obligations and escalation procedures initiated where KPIs are not met. 
Lead and execute cybersecurity events, notables, investigations and validations in accordance with internal service level agreements (SLAs). 
Achieve improvements to comprehensive security tooling and communications, including advancing automations across technology teams to reduce manual steps and expedite investigations. 
Successful execution of published CSIRT playbook(s) should an incident situation arise. 
Conduct at least two internal incident response tabletops per year among internal technology teams and one every 2-3 years with C-level executives. 

Position Requirements 

7+ years of relevant professional experience. 
5+ years of demonstrated experience in cybersecurity incident handling, incident response and security operations, which includes at least 2 years of oversight of a third-party managed service provider.  
BA/BS Degree in Cybersecurity, Computer Science, or related discipline, or equivalent practical experience. 
CISSP Certification (exceeding years of confirmed experience can circumvent this requirement). Non-CISSP-certified candidates would be encouraged to pursue CISSP certification as part of developmental expectations
within one year of start date. 
Proven experience in managing an outside managed service provider (e.g., MDR, SOC as service) to ensure KPIs and service levels are maintained. 

Knowledge, Skills & Abilities 

Exceptional written and verbal communication skills to present technical topics to technical and non-technical audiences. 
High level of comfort leading a CSIRT team which includes VP+ level executives and developing audience-targeted read outs and reports relating to incidents. 
Proven experience in incident handling/incident response techniques within a cloud-based environment such as AWS/Azure/GCP 
Interacts confidently with executive leaders in technology, legal, internal audit and our cybersecurity insurance provider(s), external counsel or external assessors/auditors and coordinates with internal
and external stakeholders during security incidents which includes non-technical and/or executive stakeholders. 
Experience with thorough, quality documentation around incident response analysis activities 
Expertise in Cyber Security attacks, tools & techniques, and experience with Advanced Threat management  
Ability to tune correlation rules and outcomes via security information and event management (SIEM) and security orchestration, automation, and response (SOAR) platforms 
Has a sound understanding of SIEM, DLP, CASB, EDR, NDR, operating systems, MITRE ATT&CK framework and other threat detection platforms 
Excellent analytical, problem-solving, and interpersonal skills. Maintains composure during high stakes/high stress situations. 
Knowledge of digital forensics tools and techniques (e.g., EnCase, FTK). Experience in conducting forensic analysis of compromised systems, including understanding of evidence handling and chain of custody
procedures. 
Proven experience and knowledge in the MITRE ATT&CK framework and VERIS Framework 
Experience with Splunk and Splunk Enterprise Security (ES) are a plus. 
Any of the following certifications are a plus: C|EH, CISA, CISM, CSSLP, GIAC, CompTIA Security+, CCSP, GIAC, AWS/Azure Certifications. 

Thanks And Regards

Pankaj Chauhan

Cell: (302)-485-1559

[email protected]

https://www.linkedin.com/in/pankajschauhan/

Accroid Inc.

1007 Orange ST 4th FL 1651 Wilmington, DE 19801

--

Keywords: cprogramm business analyst information technology green card Delaware Florida Minnesota
Cyber Security Consultant || Minneapolis, MN (Hybrid) Need local only with DL || Visa: USC/GC
[email protected]
[email protected]
View all
Mon Nov 04 20:57:00 UTC 2024

To remove this job post send "job_kill 1897382" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 6

Location: Minneapolis, Minnesota