This is a remote position.
Position Summary:
As a member of our client's Information Security Incident Response team, the Sr. Information Security Analyst– Incident Response will coordinate the response activities for cyber security incidents across the corporate environment. The successful candidate will focus on reviewing, triaging, analyzing, remediating, and reporting on cyber security incidents. The individual will manage validated cyber security incidents, in accordance with the Information Security Incident Response Plan. The successful candidate will perform functions such as log analysis, conduct in-depth technical analysis of network traffic and endpoint systems, enrich data using multiple sources, and be responsible for rapid handling and mitigation of cyber security incidents.
This is a full-time, exempt, remote position and reports to the Director, Identity and Access Management.
Base Salary Range: $125,000 - $140,000 annually.
Specific Responsibilities:
· Knowledge of current cyber threats, adversary tactics, techniques, and procedures (TTPs), such as the MITRE ATT&CK framework, mitigation techniques, and evolving security technologies.
· Experience performing malware analysis.
· Experience conducting investigations in Cloud environments (Azure).
· Experience performing Threat Hunting to uncover malicious activity that evades existing security controls.
· Experience leveraging PowerShell, Python or BASH scripting for automation, alert enrichment or investigations.
· Exposure to other major areas of Information Security, such as Vulnerability Management and Remediation, Application Security, Identity and Access Management, GRC, Penetration Testing/Red Teaming.
· Experience with various databases and query languages.
· Experience leveraging information security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, DLP, data encryption, proxies, and network access control as it relates to responding to cyber incidents.
· Broad knowledge of information systems including Windows security, network security, systems development, communication networks, security software/hardware and operating systems.
· Experience working in a team environment, with experience teaching and learning from other team members.
· Experience communicating effectively with both technical and non-technical individuals.
· Conducts investigations and responds to internal and external Information security threats.
· Provides off-hour support as needed for security monitoring and response activities.
Supervisory Responsibilities:
· None.
Requirements
Experience:
· 2 years of incident analysis, security architecture, malware research, SOC, or any other similar incident response experience.
· 3+ Years of overall IT Experience with a major emphasis on Information Security.
Education:
· Bachelor’s degree preferred.
· Security certifications – CISSP, CEH, GCIH, SSCP certifications preferred.