Urgent :: Senior-Lead Cyber Security Analyst :: (Remote) (Only USC GC) at Remote, Remote, USA |
Email: [email protected] |
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=389243&uid= From: Devansh Singh Sengar, Source Infotech [email protected] Reply to: [email protected] Hi, Please check JD, Senior/Lead Cyber Security Analyst 100% Remote 6+months C2h Visa: GC/USC Please note our client is only considering candidates that reside in the following states: AK, CO, MN, AZ, CA, DE, IA, MT, VT, WA, NY, TX and DC. Forensic knowledge method/approach that the person took for the attack. Maintain certain types of systems (Linux) IDS run on Linux / updating the systems Power and Phyton - Understand it not expert This includes coordinating the triage, prioritization and remediation of security events in coordination with internal parties and external managed security providers. This role will also be responsible for the system health, completeness, and effectiveness of security monitoring. The senior analyst will also communicate the status of ongoing security incidents, metrics, and other trends to leadership. Deploy information security solutions specialized to protect these activities. Lead the security team in the maintenance and on-going improvement of all security monitoring processes and procedures, including the Incident Response Plan, IR playbooks, communications plans, threat hunting, and SOC metrics. Leadership in issue ownership, triage activities, and resolution Responsible for incident related communications, including incident response reports, incident status updates, and implementation of lessons learned after an incident. Perform analysis of logging, malware, or other malicious activity on systems. Coordinate activities and escalations with vendor managed defense providers. Research and leverage intelligence sources to improve incident detection and response capabilities. Maintain and deploy the SIEM and other security monitoring solutions to ensure the system health, completeness, and effectiveness of security monitoring. Identify gaps in security monitoring. Requirements Five years or more experience in a security operations center or an incident response role. In-depth knowledge of security tools such as SIEM, IDS/IPS, web proxies, EDR, CASB, SIEM, DNS security, sandboxing, and firewalls. Experienced in analyzing and inspecting log files, network packets, and other security tool information outputs from multiple system types Strong knowledge of Information Security, Risk Classification, Incident Management, Security Monitoring, Threat Intelligence and Incident Response functions Scripting Forensic knowledge Thanks, Devansh Singh Sengar IT Recruiter Source InfoTech Inc., Email: [email protected] Keywords: information technology green card Alaska Arizona California Colorado Delaware Iowa Minnesota Montana New York Texas Vermont Washington http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=389243&uid= |
[email protected] View All |
01:33 AM 28-Feb-23 |