Vacancy expired!
job summary:
Our well known client is looking to bring on a Lead Cyber Ops analyst located in Rochester, NY. This position will be responsible for the day-to-day activities involved in the Cybersecurity Operations Center (CSOC) and is responsible for monitoring, detecting, and responding to cybersecurity activity across the companies data computing infrastructure. Response could include but is not limited to: troubleshooting, analysis, diagnosis, communicating with stakeholders, and resolution or coordination of resolution via support groups or business units. location: Rochester, New Yorkjob type: Permanentsalary: $110,000 - 115,000 per yearwork hours: 8am to 4pmeducation: Bachelors responsibilities:- Monitor incoming event queues for potential security incidents; identify and act on anomalous network activity
- Perform thorough analysis of APT/nation state attack, anomalous network behavior
- Detailed analysis, documentation, and strong understanding of the attack vectors, persistence mechanisms, and detection avoidance tactics
- Perform proficient forensic analysis using security tools and monitoring systems to discover the source of anomalous security events
- Perform hunting for malicious activity across the network and digital assets
- Perform detailed investigation and response activities to assist in identification, containment, eradication, and recovery actions for potential security incidents
- Analyze complex malware analysis through endpoint and network traffic forensics to determine if systems are impacted.
- Develop innovative monitoring and detection solutions using tools and other skillsets such as programming and scripting
- Work with Security engineering team to analyze SIEM use cases
- Recommend implementation of countermeasures or mitigating controls
- Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
- Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
- Mentor staff in cybersecurity techniques and processes
- Create and continuously improve standard operating procedures used by the CSOC
- Monitor external event sources for security intelligence and actionable incidents
- Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the IT organization as well as business units
- Develop metrics for network activity, threats and potential threats, and tickets cleared
- Able to work early or late hours and weekends in the pursuit of addressing and remediating incidents
- Must comply with any regulatory requirements
- Experience level: Experienced
- Minimum 5 years of experience
- Education: Bachelors
Vacancy expired!