Vacancy expired!
Senior Cyber Security Incident Responder Apex, the Nation's 2nd largest IT staffing company, is looking for a Sr. Incident Response Analyst to work remotely for a Global and Growing Financial Client. The job description is listed below, if interested please send an updated resume to Technical Recruiter, Michelle Miggins via mmiggins@apexsystems.com Location: REMOTE Duration: CTH Requirements:
- Build and execute playbooks to strengthen response activities from events or incidents
- Collaborate with IT on cyber incident response strategies, roles and responsibilities
- Design and lead tabletop exercises passionate about responses to cyber events or incidents
- Provide hands-on incident response training for IT and other members of the Cyber Blue Team
- Lead security investigations and computer forensic analysis
- Develop incident reports to include root-cause analysis, incident impact, and remediation tracking
- Utilize detective controls to develop rules and alerts to drive security monitoring capabilities
- Build and implement standard operating procedures and processes to help streamline investigations, daily monitoring and analysis research to ensure all analysts are effective and following the same guidelines
- Proactively conduct research of client's network traffic and system activity looking for security anomalies and suspicious activities
- Analyze available data sources to identify trends and make recommendations to improve network, system and data security monitoring
- Perform Advanced Persistent Threat correlation between multiple security event sources such as firewall logs, threat intelligence feeds, AV, IDS, IPS, and Cyber Threat Intelligence
- Conduct static and/or multifaceted analysis of malware to harvest indicators of compromise to improve security monitoring
- Demonstrable understanding of various security methodologies and processes, and technical security solutions (i.e. firewalls, proxies, and intrusion detection systems)
- Extensive knowledge of network and server security products, technologies, and protocols protocols including TCP/IP, UDP, DHCP, FTP, SFTP, ATM, SNMP, SMTP, SSH, SSL, VPN, RDP, HTTP and HTTPS.,
- Intelligence driven defense utilizing the MITRE ATT&CK Framework.
- Security certification(s) and/or official training, such as GCIH, CSIH, ECSA, CHFI, ECIH, CEH or similar, or degree
Vacancy expired!