Security Incident Response Analyst


Currahee Recruiting
Alpharetta, GA
United States

Category
Industry
Security
Manages Others
Yes
Experience Required
Yes
Degree Required
Yes
Employment Type
PartTime/Full Time
Work Schedule
Full-Time

Job Description

JOB DESCRIPTION

Our client, a reputable Fortune 500 multinational professional services firm, is seeking a Security Incident Response Analyst II to join their team on a permanent basis. This individual will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations.

Job Title: CDRC (Cyber Defense Response Center) Analyst II
Job Location: Alpharetta, GA
Job Type: Permanent/Direct Hire
Reporting to: CDRC (Cyber Defense Response Center) Manager
Hours: The US CDRC team provides coverage seven days a week between 7:00am and 6:00pm EST. After an initial two week period for on-boarding (Monday – Friday, 07:00am – 4:00pm), depending on the business need, the CDRC Analyst will be working Sunday – Wednesday (07:00am – 6:00pm)Wednesday – Saturday (07:00am – 6:00pm), with potential to change to other shifts as they become available.

The CDRC Analyst II will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint. The CDRC Analyst II should have familiarity with the principles of network and endpoint security, current threat and attack trends, a basic understanding of the OSI model, and have a working knowledge of defense in depth strategies. 


The CDRC Analyst II must be competent to work at a technical level, be capable of identifying threats and vectors that cause security events, and be able to follow defined procedures for mitigating said threats.


The position requires experience analyzing malware and other related cyber threats and implementing and maintaining security and analysis solutions for large enterprises, with knowledge on large scale threat analysis of event data from commercial and open source infrastructure technology platforms

Job Description:

  • Respond to network and host based security events
  • Participate in detecting, investigating, and resolving security events
  • Capable of working independently while supporting CDRC Analyst I as necessary
  • Identify and propose areas for improvement within the Cyber Defense Response Center
  • Provide documentation and project support
  • Act as second and/or third-tier support for the CDRC Analyst I
  • Act as a peer group leader to help train support staff
  • Serve as an escalation point for difficult problems and complex inquiries
  • Server as shift lead when necessary
  • Conduct detailed security event analysis from network traffic attributes and host-based attributes ( binary analysis, etc) to identify information security incidents
  • Provide feedback on security control capability gaps based off of security intrusion trends
  • Develop and maintain analytical procedures to improve security incident identification efficiency
  • Demonstrate ability to drive process improvements and identify gaps


 
Job Requirements
Job Qualifications:
Education: Bachelors in Computer Science, Information Systems, Information Security or 3-4 years of related work experience.

Experience:

Minimum of 3-4 years of experience in one or more of the following:
Working in a Security Monitoring/Security Operations Center environment (SOC)
Experience investigating security events, threats and/or vulnerabilities
Understanding of electronic investigation and log correlationProficiency with the latest intrusion detection platforms; working knowledge of Linux and/or Windows systems administration (Including AD).
Scripting or programming (Shell scripting, Python, PowerShell,Perl, Java, etc.)
Conduct detailed security event analysis from network traffic attributes and host-based attributes (memory analysis, binary analysis, etc) to identify information security incidents
Desired skill: Previous leadership experience as a team lead or supervisor.

Desired Certifications: GCIH, CEH, GCFA, GCIA, GSEC, GIAC,SSCP, Security+

Knowledge, Skills & Experience:

-Extensive experience working with SIEM, Log Aggregators, Incident Response Management solutions

-Strong technical knowledge of Networking, Operating Systems and enterprise integrations

-WAF,DDoS

-Experience managing standards, developing Security Operations Process, reporting and dashboards

-Excellent communication, collaboration, relationship management and leadership

-Self-directed and able to perform tasks without supervision

- Information Security Principles, Technologies, and Practices

-Proven experience with multiple security event detection platforms

-Thorough understanding of TCP/IP

- Understand IDS / IPS rules to identify and/or prevent malicious activity

-Demonstrated integrity in a professional environment

-Good social, communication and technical writing skills

-Comfortable navigating and troubleshooting Linux and Windows system issues

Employer
Currahee Recruiting
Deena Baker

GA
United States
Currahee Recruiting Deena Baker