Job Title: Cyber Security Incident Response Analyst
Location: Concord, CA
Duration: W2 Contract for 6+ Months
Job Description:
• Monitor incoming event queues for potential security incidents; identify and act on anomalous network activity
• Perform thorough analysis of APT/nation state attack, anomalous network behaviour
• Detailed analysis, documentation, and strong understanding of the attack vectors, persistence mechanisms, and detection avoidance tactics
• Perform proficient forensic analysis using security tools and monitoring systems to Client the source of anomalous security events
• Perform hunting for malicious activity across the network and digital assets
• Perform detailed investigation and response activities to assist in identification, containment, eradication and recovery actions for potential security incidents
• Analyse complex malware analysis through endpoint and network traffic forensics to determine if *** systems are impacted.
• Develop innovative monitoring and detection solutions using *** tools and other skillsets such as scripting
• Work with Security engineering team to analyse SIEM use cases
• Recommend implementation of counter-measures or mitigating controls
• Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
• Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
• Mentor junior staff in cybersecurity techniques and processes
• Create and continuously improve standard operating procedures used by the SIOC
• Monitor external event sources for security intelligence and actionable incidents
• Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the IT organization as well as business units
• Must comply with any regulatory requirements
Requirement:
1. Prior Incident Response experience
2. Memory forensic analysis experience
3. Strong networking skills
Minimum Qualifications
• Bachelor's degree in Computer Science or related field, or equivalent work experience
• 6 years of relevant work experience within security information technology
• Prior experience in Computer Incident Response team(CIRT)/Computer Emergency Response team(CERT), or a Security Operations Center(SOC)
• Extensive experience in network security monitoring, network packet analysis, host and server forensics.
Siva | Recruitment Specialist | (408) 731 6341