Cyber Security Analyst, Incident Response Professional
Salary undisclosed
Apply on
Original
Simplified
1-year +
Remote and onsite 3 days in Bridgewater, NJ
Background and Description: The Client's Cyber Security Operations Center (SOC) is a highly technical, operational team whose primary purpose is to rapidly detect cyber security attacks and intrusions and eliminate them. Incident Response is at the forefront of this service. Candidate is expected to address incidents created within Client's scope, investigate them using client tools, draw from their experience and client's needs to make a conclusion, and bring protection to return the organization to its expected organization posture.
5 years' of demonstrated experience in:
Start Date: 11/1/2024
Project Duration: 1 year with likely extensions
Remote and onsite 3 days in Bridgewater, NJ
Background and Description: The Client's Cyber Security Operations Center (SOC) is a highly technical, operational team whose primary purpose is to rapidly detect cyber security attacks and intrusions and eliminate them. Incident Response is at the forefront of this service. Candidate is expected to address incidents created within Client's scope, investigate them using client tools, draw from their experience and client's needs to make a conclusion, and bring protection to return the organization to its expected organization posture.
- Candidate is expected to have highly developed technical abilities and the ability to discern benign events from malicious ones.
- Must have timely response to incidents, as defined by the SOC and evaluated on a weekly, monthly, quarterly, and yearly basis.
- Must be able to complete incidents for quality, defined as an understanding of the incident principles, and correctly assigning values to an incident at the beginning of the incident, during the investigation, and at its closure. This should include a detailed summary of the incident at its completion
5 years' of demonstrated experience in:
- Understanding of network principles
- Endpoint detection & response tools
- Sandboxing tools, and an understanding of how to interpret their reports
- Threat Hunting for events using tools such as a SIEM
- Rapid Response to Incidents
- Incident Documentation using a SOAR
- Identifying and Analyzing Hacking Behaviors
- Email Security Principles and Protection Experience
- Understanding of the Red team/Adversary approach to cyber security protections
- Fluent in English, extremely important
- Certifications such as CISSP, CEH, GIAC
- BS degree in Computer Science (preferably in Information Security) or equivalent work experience.
Start Date: 11/1/2024
Project Duration: 1 year with likely extensions
Similar Jobs