*Please send resumes to prav...@addonusa.com* Hi,
Please let me know if you're comfortable with the below requirement ASAP. *Information Security Analysts opportunity in 18008-1* *Location: Manhattan, NY and Denver, CO* *Duration: 9 Months CTH* *US Citizen’s only* *Need last 5 digits of SSN & DOB (month and day)* *Client: First Data* The manager is looking for candidates that come from an ANALYST role rather than engineering. He prefers them to have experience working security events and incidents through analysis and triage rather than the install and maintenance of hardware. Job Description: The *Security Engineer* role *of Senior Security Analyst* reviews escalated security events and conducts additional analytics to determine if events require further incident response actions. This position is integral to providing input into correlations, process improvements and supporting investigations through researching and supplying event activity. This position is also responsible for mentoring junior analysts and improving incident response times and analysis of incidents. Job Specific Responsibilities • Ability to work flexible schedule to support 24x7 global triage and response team • Able to run down an incident from start to finish without higher level supervision • Work closely with team leads, the Investigations/Forensics team members, as well as many other IT and application teams to form a cohesive monitoring and response function • Manage multiple incidents at the same time with changing priorities • Ability to lead investigative activates and present analysis finding in both oral and written communication • Ability to present complex problems in team meetings • Change oriented – actively generates process improvements, supports and drives change, and confronts difficult circumstances in creative ways • Responsible for mentoring, training and support of Level 1 Analysts Candidate Requirements • Experience in conducting detailed network, log and host centric analysis (i.e. firewall, proxy, IDS, WAF, DAM, system logs) to identify security incidents • Subject matter expert in three or more areas such as Windows, Unix, proxy, firewalls, threat detection, malware analysis, emerging threats and attacks • Previous experience in and a proven method for performing 1st level analysis and interpretation of information from SIEM systems • Previous experience in and proven methods for incident identification/analysis, escalation procedures, and reduction of false-positives • Conduct reviews of threat analysis activities to identify trends for potential efficiency and potential gaps • Strong understanding of TCP/IP, networking concepts and OSI model • Prior experience with scripting or programming languages to enhance event analysis efficiency • Ability to rapidly find, assimilate and synthesize information correctly while under pressure • Ability to think strategically; work with a sense of urgency and pay attention to detail • Independent thinking, willingness to "step outside the box" and take reasonable, calculated risks • Strong team player who collaborates well with others to solve problems and actively incorporates input from various sources • Excellent written and verbal communication and organizational skills • Must have one of these certifications GCIH, CISSP, or similar Preferred Qualifications • 3+ years of experience in the Information Security field • 5+ years of related IT experiences • MS preferred or Bachelor’s degree in computer science, engineering or a related discipline, or the equivalent combination of education, technical training or work/military experience • Security certifications like CISSP or GIAC *Hiring Manager Conference call notes:* *Must have:* Incident Response Analyst who has experience with triage intrusion detection – working in a sec ops environment Experience reviewing security, triage, analysis and escalating Experience with Hyper security events and event analysis Most of candidates that have been submitted have engineering backgrounds. *Top 3 things:* 1) Incident response – security review and triage response (doesn’t have to be tool set) 2) Foundation to triage and take action, analysis, reviews 3) Tools: Netwitness investigator, Splunk, Mandiant – end users that use the product, that can respond – DO NOT WANT ENGINEERS OR DEVELOPERS Thanks & Regards, Praveen Kumar Ravuru Addon Technologies 734-956-4737 Ext 168 / 313-759-8693 prav...@addonusa.com <an...@addonusa.com> www.addonusa.com Gtalk & YM: praveen.addon "The LORD your GOD will bless you in all your produce and in all the work of your hands so that you surely rejoice"Deuteronomy 16:15 (NKJV) Note: We respect your Online Privacy. This is not an unsolicited mail. Under Bills 1618 Title III passed by the 105th U.S. Congress, this mail cannot be considered Spam as long as we include contact information and a method to be removed from our mailing list. To be removed from our mailing list, please reply with "REMOVE" in the subject line and your email address in the body. Include Complete Address and/or Domain/Aliases to be removed. We sincerely regret any inconvenience. -- You received this message because you are subscribed to the Google Groups "as400placements1" group. To unsubscribe from this group and stop receiving emails from it, send an email to hrccpl+unsubscr...@googlegroups.com. To post to this group, send an email to hrccpl@googlegroups.com. Visit this group at http://groups.google.com/group/hrccpl. For more options, visit https://groups.google.com/d/optout.