Title: IT - Consultant
Location: San Ramon CA 94583
Duration: 06 months contract.
- Major Areas of Responsibility/Tasks Utilizes digital forensic tools including Guidance Encase to execute digital investigations and perform incident response activities Conduct investigations of computer based events and other security issues Establishes links between suspects and other violators by piecing together evidence uncovered from a variety of sources Establishes and maintains defensible evidentiary process for all investigations Uses & maximizes relevant investigative tools, software and hardware Coordinates with IT to leverage skills and resources in support of investigations Advances the practice and science of information security investigation Perform hunting for malicious activity across the network and digital assets Respond to computer security incidents and conduct threat analysis Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network Perform detailed investigation and response activities for potential security incidents Provide accurate and priority driven analysis on cyber activity/threats Perform payload analysis of packets Detonate malware to assist with threat research Recommends implementation of counter-measures or mitigating controls Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity Develop innovative monitoring and detection solutions using PG&E tools and other skillsets such as scripting Mentor junior staff in cybersecurity techniques and processes Resolve or coordinate the resolution of cyber security events Maintain incident logs with relevant activity Document investigation results, ensuring relevant details are passed to senior analysts and stakeholders Participate in root cause analysis or lessons learned sessions Write technical articles for knowledge sharing Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units.
Amit Sharma| Talent Acquisition