Home

Urgent :: Senior-Lead Cyber Security Analyst :: (Remote) (Only USC GC) at Remote, Remote, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=389243&uid=

From:

Devansh Singh Sengar,

Source Infotech

[email protected]

Reply to:   [email protected]

Hi,

Please check JD,

Senior/Lead Cyber Security Analyst

100% Remote

6+months C2h

Visa: GC/USC

Please note our client is only considering candidates that reside in the following states: AK, CO, MN, AZ, CA, DE, IA, MT, VT, WA, NY, TX and DC.

Forensic knowledge method/approach that the person took for the attack.

Maintain certain types of systems (Linux)

IDS run on Linux / updating the systems

Power and Phyton - Understand it not expert

 This includes coordinating the triage, prioritization and remediation of security events in coordination with internal parties and external managed security providers.  This role will also be responsible for the system health, completeness, and effectiveness of security monitoring.  The senior analyst will also communicate the status of ongoing security incidents, metrics, and other trends to leadership. 

  Deploy information security solutions specialized to protect these activities. 

Lead the security team in the maintenance and on-going improvement of all security monitoring processes and procedures, including the Incident Response Plan, IR playbooks, communications plans, threat hunting, and SOC metrics. 
Leadership in issue ownership, triage activities, and resolution 
Responsible for incident related communications, including incident response reports, incident status updates, and implementation of lessons learned after an incident. 
Perform analysis of logging, malware, or other malicious activity on systems. 
Coordinate activities and escalations with vendor managed defense providers. 
Research and leverage intelligence sources to improve incident detection and response capabilities. 
Maintain and deploy the SIEM and other security monitoring solutions to ensure the system health, completeness, and effectiveness of security monitoring. 
Identify gaps in security monitoring. 

Requirements 

Five years or more experience in a security operations center or an incident response role. 
In-depth knowledge of security tools such as SIEM, IDS/IPS, web proxies, EDR, CASB, SIEM, DNS security, sandboxing, and firewalls. 
Experienced in analyzing and inspecting log files, network packets, and other security tool information outputs from multiple system types 
Strong knowledge of Information Security, Risk Classification, Incident Management, Security Monitoring, Threat Intelligence and Incident Response functions 
Scripting 
Forensic knowledge 

Thanks,

Devansh Singh Sengar

IT Recruiter

Source InfoTech Inc.,

Email: [email protected]

Keywords: information technology green card Alaska Arizona California Colorado Delaware Iowa Minnesota Montana New York Texas Vermont Washington
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=389243&uid=
[email protected]
View All
01:33 AM 28-Feb-23


To remove this job post send "job_kill 389243" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 0

Location: ,