Cyber Security Incident Response Engineer
Posted on Dec 12, 2018 by Request Technology - Craig Johnson
Prestigious Enterprise Company is currently seeking a Cyber Security and Incident Response Engineer. Candidate will be part of a team that will help carry Information Security department's vision of reducing information risk by ensuring and enhancing the availability, reliability and accessibility of Information systems. Candidate will assist in responding to security incidents in a mission critical production environment, such as investigating and remediating possible endpoint malware infections, mitigating threats such as unauthorized use, spam and phishing.
Manage security events identified from enterprise SIEM tool, Threat Intelligence, end user notifications, etc. to determine security risk and respond accordingly.
Coordinate response, triage and escalation of security events affecting the company's information assets and activities within the Incident Response team.
Categorize, prioritize, and normalize an event to determine if it meets the threshold of a potential incident and declare an incident, if required following documented process.
Analyze and research known indicators of compromise (IOCs), correlate events, identify malicious activity, and take appropriate containment steps.
Formulate and execute a response to the incident and verify that it is contained, eradicated and systems are recovered.
Based on the review of the process and steps taken to remediate an incident, suggest and implement improvements in the environment (such as improving technical controls) and/or improve the incident response process.
Apply critical thinking in understanding the new & emerging threats working along with Cyber Threat Intelligence and Threat detection team and then build & execute required action plan.
Effectively collaborate within Information Security with Security Operations, Threat Intel, Forensics, Threat Detection and Vulnerability management teams as well as external teams in various lines-of-business to enable enhancements in security posture.
Present security analysis, action plan and risks to different audiences and adjust the delivery accordingly (business, technical and management) using either structured presentations or ad-hoc, and establish consensus.
Establish and maintain business relationships with individual contributors as well as management.
Participate in the review and documentation of requirements for analysing the specific threats to assist in development of new use cases to detect, report, log, track, and escalate security events.
Communicate effectively and clearly to both technical and non-technical audience
Augment Incident Response team to ensure 24/7 coverage and operations. Responsibilities occasionally will require working evenings and weekends, sometimes with little or no advanced notice.
Routinely develop and update incident response playbooks to ensure response activities align with best practices, minimize gaps in response and provide comprehensive mitigation of threats and also provide guidance to Junior Analysts on Incident Response activities.
Execute daily ad-hoc tasks or manage small projects as needed.
5-7 years of Information Security or Incident Response related experience.
2+ years of hands-on experience in at least two of the following areas: security operations, incident response, network/host intrusion detection, threat response.
Bachelor's degree in Information Security, Computer Science, Information Technology, related field or equivalent work experience.
Demonstrated experience in handling security events in mission critical environments; hands-on troubleshooting, analysis, and technical expertise to resolve incidents and service requests.
Proven past experience in day-to-day operational processes such as security monitoring, data correlation, troubleshooting, security operations etc.
Good grasp of security incident response, such as different phases of response, vulnerabilities vs threats vs actors, Indicators of Compromise (IOCs), etc.
Experience analysing system and application logs to investigate security issues and/or complex operational issues.
Strong knowledge of enterprise detection technologies and processes (Advanced Threat Detection Tools, IDS/IPS, Network Packet Analysis, Endpoint Protection).
Demonstrated experience with utilizing SIEM (such as Splunk, LogRythm etc) in investigating security issues and/or complex operational issues on Windows and Unix .
Strong knowledge of network protocols and operating systems (Windows, Unix, Linux, Databases).
GIAC, GCIH, CEH, CSA+, CISSP certifications
Threat Hunting experience
Experience in the financial services industry
Experience in Unix Scripting, Programming, SQL