Job Details

Cyber Security Incident Response Analyst / Cyber Security Threat Analy

Advertiser
Finezi Inc.
Location
Concord, California, United States
Rate
-

Position : IT - Cyber Security Threat Analyst /Specialist- Expert

Location : Concord, CA

Duration: 6 Month+ Contract



Qualifications:


***SWING SHIFT - 2 PM - 10:30PM***


TOP 3 must haves we are looking for :


1. Prior Security Operation Center (SOC) experience

2. Strong networking skills

3. Event Monitoring / Incident Response


Minimum Qualifications


• Bachelor's degree in Computer Science or related field, or equivalent work experience

• 4 years of relevant work experience within security information technology

• Extensive experience in network security monitoring, network packet analysis and / or host and server forensics

• Strong networking knowledge - TCP/IP protocols, OSI model, Firewalls and other networking devices

• Experience in packet analysis and malware analysis

• Strong customer service skills and decision-making skills

• Good analytical skills - ability to analyze and think out of the box when working a security event

• Familiarity with scripting languages such as Python, Perl, PowerShell

• Self-motivated, methodical and detail oriented



Desired Qualifications

• Utility Industry experience

• Prior SIEM experience - Security Information & Event Management system, log aggregation and event notification tool such as IBM QRadar

• Ability to reverse engineer malware

• Familiarity with regulatory requirements such as NERC/CIP, NIST, SOX etc.

• Extensive experience in industry well known as well as open source Network and/ or Host forensic tools

• Formal IT Security/Network Certifications such as: CompTIA, SANS GIAC, ISC², CCNA




Responsibilities

• Monitor incoming event queues for potential security incidents; identify and act on anomalous network activity

• Perform proficient forensic analysis using security tools and monitoring systems to discover the source of anomalous security events.
• Perform hunting for malicious activity across the network and digital assets

• Perform detailed investigation and response activities for potential security incidents

• Analyze complex malware analysis through endpoint and network traffic forensics to determine if PG&E systems are impacted.

• Develop innovative monitoring and detection solutions using PG&E tools and other skillsets such as scripting

• Work with Security engineering team to analyze SIEM use cases

• Recommend implementation of counter-measures or mitigating controls

• Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment

• Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity

• Mentor junior staff in cybersecurity techniques and processes

• Create and continuously improve standard operating procedures used by the SIOC

• Monitor external event sources for security intelligence and actionable incidents

• Must comply with any regulatory requirements



Job Requirements:

Please send the updated resume in word format with contact details ASAP to .


Send application

Mail this job to me so I can apply later

Apply With CV

You are not logged in. If you have an account, log in to your account. If you do not have an account, why not sign up? It only takes a minute!

latest videos

Upcoming Events