*Please send resumes to prav...@addonusa.com*

Hi,

Please let me know if you're comfortable with the below requirement ASAP.

*Information Security Analysts opportunity in 18008-1*

*Location: Manhattan, NY and Denver, CO*

*Duration: 9 Months CTH*

*US Citizen’s only*

*Need last 5 digits of SSN & DOB (month and day)*

*Client: First Data*





The manager is looking for candidates that come from an ANALYST role rather
than engineering.
He prefers them to have experience working security events and incidents
through analysis and triage rather than the install and maintenance of
hardware.


Job Description:
The *Security Engineer* role *of Senior Security Analyst* reviews escalated
security events and conducts additional analytics to determine if events
require further incident response actions. This position is integral to
providing input into correlations, process improvements and supporting
investigations through researching and supplying event activity. This
position is also responsible for mentoring junior analysts and improving
incident response times and analysis of incidents.

Job Specific Responsibilities
• Ability to work flexible schedule to support 24x7 global triage and
response team
• Able to run down an incident from start to finish without higher level
supervision
• Work closely with team leads, the Investigations/Forensics team members,
as well as many other IT and application teams to form a cohesive
monitoring and response function
• Manage multiple incidents at the same time with changing priorities
• Ability to lead investigative activates and present analysis finding in
both oral and written communication
• Ability to present complex problems in team meetings
• Change oriented – actively generates process improvements, supports and
drives change, and confronts difficult circumstances in creative ways
• Responsible for mentoring, training and support of Level 1 Analysts

Candidate Requirements
• Experience in conducting detailed network, log and host centric analysis
(i.e. firewall, proxy, IDS, WAF, DAM, system logs) to identify security
incidents
• Subject matter expert in three or more areas such as Windows, Unix,
proxy, firewalls, threat detection, malware analysis, emerging threats and
attacks
• Previous experience in and a proven method for performing 1st level
analysis and interpretation of information from SIEM systems
• Previous experience in and proven methods for incident
identification/analysis, escalation procedures, and reduction of
false-positives
• Conduct reviews of threat analysis activities to identify trends for
potential efficiency and potential gaps
• Strong understanding of TCP/IP, networking concepts and OSI model
• Prior experience with scripting or programming languages to enhance event
analysis efficiency
• Ability to rapidly find, assimilate and synthesize information correctly
while under pressure
• Ability to think strategically; work with a sense of urgency and pay
attention to detail
• Independent thinking, willingness to "step outside the box" and take
reasonable, calculated risks
• Strong team player who collaborates well with others to solve problems
and actively incorporates input from various sources
• Excellent written and verbal communication and organizational skills
• Must have one of these certifications GCIH, CISSP, or similar

Preferred Qualifications
• 3+ years of experience in the Information Security field
• 5+ years of related IT experiences
• MS preferred or Bachelor’s degree in computer science, engineering or a
related discipline, or the equivalent combination of education, technical
training or work/military experience
• Security certifications like CISSP or GIAC



*Hiring Manager Conference call notes:*



*Must have:*

Incident Response

Analyst who has experience with triage intrusion detection – working in a
sec ops environment

Experience reviewing security, triage, analysis and escalating

Experience with Hyper security events and event analysis

Most of candidates that have been submitted have engineering backgrounds.



*Top 3 things:*

1)     Incident response – security review and triage response (doesn’t
have to be tool set)

2)     Foundation to triage and take action, analysis, reviews

3)     Tools: Netwitness investigator, Splunk, Mandiant – end users that
use the product, that can respond – DO NOT WANT ENGINEERS OR DEVELOPERS



Thanks & Regards,



Praveen Kumar Ravuru

Addon Technologies

734-956-4737 Ext 168 / 313-759-8693

prav...@addonusa.com <an...@addonusa.com>

www.addonusa.com

Gtalk & YM: praveen.addon



"The LORD your GOD will bless you in all your produce and in all the work
of your hands so that you surely rejoice"Deuteronomy 16:15 (NKJV)



Note: We respect your Online Privacy. This is not an unsolicited mail.
Under Bills 1618 Title III passed by the 105th U.S. Congress, this mail
cannot be considered Spam as long as we include contact information and a
method to be removed from our mailing list. To be removed from our mailing
list, please reply with "REMOVE" in the subject line and your email address
in the body. Include Complete Address and/or Domain/Aliases to be removed.
We sincerely regret any inconvenience.

-- 
You received this message because you are subscribed to the Google Groups 
"as400placements1" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to hrccpl+unsubscr...@googlegroups.com.
To post to this group, send an email to hrccpl@googlegroups.com.
Visit this group at http://groups.google.com/group/hrccpl.
For more options, visit https://groups.google.com/d/optout.

Reply via email to