Tuesday, February 10, 2015

Information Security - Incident Response

Information Security

Location : Palo Alto, CA

Duration : 3-6 Months contract to hire

Rate : OpenThe client is Stanford Medical and they need to forensic security background

Job Description: 

a.      Consultant will manage the forensic collection of evidence for analysis, review proxy logs for suspicious activity, use open source tools to validate findings, collect   forensic images, and associated log data for relevant incidents.
b.      Consultant will draft reports on the findings of forensic analysis, to include the software version levels, and patch levels of the software, as well as initial vector analysis,           and collection of Indicators of Compromise (IOCs).
c.      Consultant will perform forensic analysis on initial vector (if possible), Indicators of Compromise (files created/hashes, Domains/IPs used, malware type)
d.      Consultant will track all cyber incidents to ensure response actions are performed consistent with procedures.
e.      Consultant will analyze existing workflow and practices and document or communicate to SHC any gaps or deficiencies identified or observed.
f.       Consultant is responsible for the timeliness and quality of all deliverables produced and Services provided hereunder.

Deliverables:

Regular Status Reporting: Summarizes activities completed, issues requiring attention and plans for the next reporting period.  It also contains key statistics and information such as scanning progress, indicators of compromise identified, compromised systems and time line of attacker activity

Investigative Reporting and Analysis: The results of any investigative or analysis activities performed during the course of the work.  This document shall include an executive summary as well as descriptions of the attack vector, summary of the attack, extent of compromise, data exposure, remediation recommendations, malware analysis, forensic analysis and related exhibits.
If applicable, the contractor shall bring and install software tools to aid in incident response activities, including to detect malicious activity.  These tools shall include network detection as well as host detection, as directed by SHC staff.

Job Description

Security Engineer (mid-career)
·         Solid understanding of system and network administration for Windows, Unix knowledge a plus
·         Solid understanding of security infrastructure component operation and use (SIM/SIEM, IDS, Anti-malware, Host Based, Data Loss Prevention, EnCase, NetFlow, etc.)
·         Knowledgeable on Incident Response processes and response actions
·         Understanding of cyber threats and malware methodologies, actors and motivations


Please send your resume along with the following details.

1. Full Name
2. Contact Number
3. US Visa Status
4. Billing Rate
5. Current Location
6. Availability
7. Relocation

Thanks & Regards

Robin
Technical Recruiter
Amtex Enterprises Inc / An E-Verified Employer
4699, Old Ironsides Dr, Suite 270, Santa Clara, CA -95054

Direct : 408-470-4003
Ph : 408 734 4050 Ext 251
E-Fax : 775 582 2121

IM : robinamtex
E-mail: robin@amtexenterprises.comrobinamtex@gmail.com
www.amtexenterprises.com