The Incident Response Analyst will provide detection, containment, and analysis of security events to protect the confidentiality, integrity, and availability of information systems in accordance with the firm's business objectives, regulatory requirements, and strategic goals.
Responsibilities :
- Provide Tier 2 incident response services to the global organization on behalf of the Information Security Team
- Receive, process, and resolve tickets per defined SLA's
- Analyze information garnered from monitoring systems, operational incidents, and other sources to determine the scope and impact of potential security incidents, and process accordingly
- Critically assess current practices and provide feedback to management on improvement opportunities
- Assist with the design and implementation of threat detection and prevention solutions identified as necessary for the protection of Firm assets
- Effectively utilize common IR toolsets, platforms, and processes, such as SIEM, log management, packet capture, and breach detection systems
- Assist with forensic examinations and chain-of-custody procedures as directed by the Security Incident Response Engineers
- Provide input into standards and procedures
- Report compliance failures to management for immediate remediation
- Maintain assigned systems to ensure availability, reliability, and integrity, including the oversight of current and projected capacity, performance, and licensing
- Provide status reports and relevant metrics to the Security Operations Manager
- Contribute to the Firm's security-related information repositories and other marketing / awareness endeavors
- Participate in special projects as needed
Skills and Experience :
Education :
Possess a Computer Science Bachelors Degree or substantial equivalent experienceSpecial Requirements, Licenses, and Certifications :
GCFE, GCFA, GCTI, GREM, GPEN, GWAPTCISSP or SSCP desiredExperience :
Some professional experience in information security with aFocus on incident response and forensics
Foundational knowledge of IR concepts and best practices, including forensics and chain-of-custodyExperience with common IR tools such as SIEM, log management, IDS, breach detection systems (APT / BDS / EDR), and packet capture.Broad understanding of TCP / IP, DNS, common network services, and other foundational topicsWorking knowledge of malware detection, analysis, and evasion techniquesAble to conduct static and dynamic analysis of malware to extract indicators of compromise, profile malware behavior, and provide recommendations for mitigating and detecting malware; Able to analyze suspicious websites, script-based and malware codeExperience with vulnerability management tools such as Qualys, Nessus, or other vulnerability scanning discovery toolsBroad familiarity with the threat landscape and the ability to adapt practices to evolving circumstancesIdentify, analyze, and report threats within the enterprise by using information collected from a variety of sources (IDS / IPS, SIEM, AV), to protect data and networks. Implement techniques to hunt for known and unknown threats based on available threat intelligence reports and knowledge of the attacker's TTPsAble to gather and analyze facts, draw conclusions, define problems, and suggest solutionsMaintain critical thinking and composure under pressureStrong written and oral communication skills. Ability to convey complex concepts to non-technical constituents. Proficiency in oral and written EnglishCapable of assisting with the preparation of internal training materials and documentationAble to be productive and maintain focus without direct supervisionPassionate in the practice and pursuit of IR excellenceCan exhibit a disciplined and rigorous approach to incident handlingWilling to accommodate shift-based work for a global organizationProvide exemplary customer service by striving for first-call resolution and demonstrating empathy, respect, professionalism, and expertiseExperience with digital forensics on host or network and identification of anomalous behavior on the network or endpoint devices. Familiar with host and network-based forensic tools such as EnCase, FTK, Sleuth Kit, X Ways, etc.Atleast 4- 5 years relevant experienceL2 / L3 support with full IR lifecycle experience (Preparation, identification, containment, eradication / remediation, recovery, lessons learned / follow-up)Indicate years of hands-on experience :Incident Response
Threat DetectionMalware AnalysisForensicsIncident HandlingSecurity Incident ManagementNetwork Traffic AnalysisSecurity Orchestration, Automation, and Response (SOAR)Threat HuntingThreat IntelligenceEndpoint Detection and Response (EDR)Vulnerability ManagementCloud ForensicsCloud Incident ResponseSecurity Information and Event Management (SIEM)