Hello,


Hope you are doing great...!!!



I am attaching a job description for your review. If you are interested so
please revert me back with your updated resume. Please call me on  *6145037633
*or e-mail me at *an...@technocraftsol.com* <an...@technocraftsol.com>



*Job Title:                  Senior Cyber Security Analyst(USC or GC or GC
EAD or H4 EAD only)*

*Location:                  Charlotte NC*

*Contract Length:       12 months *


*Job Decription:-*

*LinkedIn Profile (link)?*

The Cybersecurity Operations Center Analyst is responsible for detecting,
assessing and responding to cyber security events and incidents across the
environment. The Analyst will work closely with peers, other
internal/external teams and management in a 24x7 Cybersecurity Operations
Center (CSOC) environment. The Analyst also is responsible for following
processes and procedures as defined by Cybersecurity leadership and the
Computer Incident Response Team (CIRT).

*Responsibilities for this position may include but are not limited to:-*

·         Conduct network, endpoint, and log analysis by utilizing various
consoles on a regular basis to analyze and triage cybersecurity events
(e.g., SIEM, IPS, firewall, etc.) and perform continuous hunt across the
environment.

·         Reconstruct cyber events, assess cyber threat and scope of
impact, identify and track any internal lateral or external movement, and
develop response solutions.

·         Interact with security community to obtain technical cyber threat
intelligence.

·         Track cyber threat actors/campaigns based off technical analysis
and open source/third party intelligence.

·         Research and track new exploits and cyber threats.

·         Lead containment of threats and remediation of environment during
or after an incident.

·         Lead cursory and/or in-depth analysis (i.e. packet captures,
endpoint behaviors, etc.), or collaborate with peers when appropriate for
hand-offs/escalations.

·         Conduct analysis of malicious code and weaponized documents
through behavioral analysis or reverse engineering.

·         Lead mitigations to address cyber threats and lead other incident
response coordination and remediation activities.

·         Communicate and report on key intelligence, analysis and response
activities, relevant metrics, and KPIs.

·         Monitor trends of compromise, intrusion, deficiency, significant
event or threat to the security posture and security baseline.

·         Enhance and tune detections and alerts and other cyber event
correlation rules to reduce false positives.

·         Provide creative and innovative solutions to automate and enhance
processes and capabilities.

·         Oversee execution of established operational processes and
procedures by CSOC analysts to analyze, escalate, and lead remediation of
security incidents.

·         Work with CSOC manager to develop, establish and execute incident
response and escalation processes and procedures.

·         Collaborate with CSOC manager and analysts to provide reports to
the Cybersecurity leadership team.

·         Train and assist other analysts on the policies and procedures of
the CSOC.

·         Review their research, analysis and conclusions for completeness.

·         Provide 24x7 operational support for escalations on a rotating
on-call shift basis

*Required Qualifications:*

·         5+ years of Cybersecurity experience in a security operations
center with strong understanding of Cybersecurity frameworks and incident
and security event management

·         Experience analyzing host and network based logged events
(i.e. firewall,
IPS/IDS, Windows, Web, proxy, and mail filtering)

·         Experience with SIEM technology and logging environments.

·         Demonstrated capability to work with little management oversight
and must have strong personal initiative.

·         Motivated self-starter with strong written and verbal
communication skills, and the ability to create complex technical reports
on analytic findings and provide briefings to various levels of staff /
management.

·         Ability to work in high pressure situations and within a team
environment.

·         Experience with writing and editing technical documentation and
operational procedures.

·         Demonstrated effective problem solving & analytical skills

*Desired Qualifications**: *

·         Direct backgrund or exposure to cyber security operations

·         Knowledge of network monitoring, analysis, troubleshooting, and
configuration control technologies

·         General networking understanding and/or experience to include
understanding of TCP/IP communications & knowledge of how common protocols
and applications work at the network level, including DNS, HTTP, and SMB

·         Windows and UNIX/Linux command line scripting experience and
programming experience.

·         Demonstrated understanding of the life cycle of network threats,
attacks, attack vectors and methods of exploitation with an understanding
of intrusion set tactics, techniques and procedures (TTPs).

·         Experience with forensics and malware analysis concepts and
methods.

·         Familiarity or experience with the Cyber Kill Chain® methodology

·         Possession of one or more industry standard certification such as
SANS GIAC/GCIA/GCIH/GCFA, CISSP, CISA, etc. or other network / system
security certifications.

Best Regards,

*Ankit Bhardwaj(AB) – IT Recruiter*



*Desk:*    *6145037633*

*E-Mail:* *an...@technocraftsol.com* <an...@technocraftsol.com>

-- 
You received this message because you are subscribed to the Google Groups "Open 
Source Erp & Crm" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to open-source-erp-crm+unsubscr...@googlegroups.com.
To post to this group, send email to open-source-erp-crm@googlegroups.com.
Visit this group at https://groups.google.com/group/open-source-erp-crm.
For more options, visit https://groups.google.com/d/optout.

Reply via email to