Job Details

Lead Cyber Security Threat Specialist (Security Operation Center Exper

Advertiser
GSRINC
Location
Concord, California, United States
Rate
-

Job Title: IT - Cyber Security Threat Analyst /Specialist- Expert

Location: Concord, CA

Duration: 6 Months W2 Contract

Rate: Depends on Experience

NOTE: This is a W2 contract position, NO VENDORS PLEASE

Contract to hire and/or high chance of contract extension.
Looking for someone to come in as a kind of a team lead

**LOCAL & NON-LOCAL ARE OKAY AS LONG AS THEY ARE READY TO BE ONSITE ONCE SIP IS LIFTED** (so please specify this on top of resume if non-local)

**SWING SHIFT: Monday to Friday 2/2:30PM - 10:30 PM.

**Equipment: Laptop until Client laptop can be provided**

TOP THINGS:

  • Prior Incident Response experience
  • Prior Security Operation Center (SOC) experience
  • Malware analysis experience
  • Endpoint experience

Position Summary

This is a challenging and fast paced position in Security Intelligence and Operations Center (SIOC) which is responsible for detecting, analyzing and responding to any suspicious cyber security activity across business and operational networks. The SIOC is a critical team within broader Information Security team which is led by Vice President - Chief Information Security Officer.

Major Areas of Responsibility/Tasks:

  • Utilizes digital forensic tools to execute digital investigations and perform incident response activities
  • Conduct investigations of computer based events and other security issues
  • Establishes links between suspects and other violators by piecing together evidence uncovered from a variety of sources
  • Establishes and maintains defensible evidentiary process for all investigations
  • Uses & maximizes relevant investigative tools, software and hardware
  • Coordinates with IT to leverage skills and resources in support of investigations
  • Advances the practice and science of information security investigation
  • Perform hunting for malicious activity across the network and digital assets
  • Respond to computer security incidents and conduct threat analysis
  • Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network
  • Perform detailed investigation and response activities for potential security incidents
  • Provide accurate and priority driven analysis on cyber activity/threats
  • Perform payload analysis of packets
  • Detonate malware to assist with threat research
  • Recommends implementation of counter-measures or mitigating controls
  • Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
  • Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
  • Develop innovative monitoring and detection solutions using PG&E tools and other skillsets such as scripting
  • Mentor junior staff in cybersecurity techniques and processes
  • Resolve or coordinate the resolution of cyber security events
  • Maintain incident logs with relevant activity
  • Document investigation results, ensuring relevant details are passed to senior analysts and stakeholders
  • Participate in root cause analysis or lessons learned sessions
  • Write technical articles for knowledge sharing
  • Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units

Qualifications

  • Bachelor's degree in Computer Science or related field, or equivalent work experience
  • 6 years of Information Technology experience, with at least 4 years of experience in information security working within incident response/forensics or equivalent functions
  • Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC) experience

Knowledge, Skills, and Abilities/ Technical Competencies:

  • - Previous experience with a variety of cyber investigation tools
  • - Strong technical skills including malware analysis, memory forensics, live response techniques, registry analysis, scripting, and other relevant technical security skills such as memory forensics
  • - Experience investigating and mitigating APT style attacks
  • - Strong case management and forensic procedural skills
  • - Intelligence driven defense utilizing the Cyber Kill Chain
  • - Deep knowledge of log, network, and system forensic investigation techniques
  • - Deep knowledge of diverse operating systems, networking protocols, and systems administration
  • - Deep knowledge of commercial forensic tools
  • - Deep knowledge of common indicators of compromise and of methods for detecting these incidents
  • - Deep knowledge of IT core infrastructure and cyber security components/devices
  • - Deep knowledge of TCP/IP Networking and knowledge of the OSI model
  • - Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
  • - Excellent problem solving, critical thinking, and analytical skills - ability to de-construct problems
  • - Strong customer service skills and decision-making skills
  • - Significant experience with packet analysis (Wireshark) and Malware analysis preferred

Regards,

Dominic Savio

- provided by Dice

Send application

Mail this job to me so I can apply later

Apply With CV

You are not logged in. If you have an account, log in to your account. If you do not have an account, why not sign up? It only takes a minute!

latest videos

Upcoming Events