Vacancy expired!
- Performs network security monitoring and incident response
- Review and timely respond to the detection of malicious, misuse and anomalous activities
- Summarize events and incidents effectively to different constituencies such as legal counsel, executive management and technical staff, both in written and verbal forms
- Ongoing review of SIEM dashboards, system, application logs, Intrusion Detection Systems (IDS) and monitoring tools
- Recognizes potential, successful and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information.
- Defining protocols and maturing ‘playbooks’ of operational response to cyber threats
- 5-7 years of relevant SOC Analyst experience within security disciplines (forensics, email security, monitoring, detection)
- Understanding of security incident handling and forensics skills including probing and attack methods, network/service discovery, system assessment, viruses and other forms of malware.
- Experience with IDS/IPS, SIEM and PEN test tools.
- Strong understanding of Network Concepts
- Knowledge and experience with PC’s, LAN topologies, routers, hubs, and terminal servers.
- Strong analytical skills and attention to detail, as well as excellent communication skills
- Experience working in a Healthcare environment is a plus
- CISSP certification is preferred
- Experience utilizing such programs as QRadar, Maize Analytics (Epic EMR Specific), Varonis, Proofpoint, BitDefender, Rapid7, amongst other programs
Vacancy expired!