Hello,
Hope you are doing great...!!! I am attaching a job description for your review. If you are interested so please revert me back with your updated resume. Please call me on *6145037633 *or e-mail me at *an...@technocraftsol.com* <an...@technocraftsol.com> *Job Title: Senior Cyber Security Analyst(USC or GC or GC EAD or H4 EAD only)* *Location: Charlotte NC* *Contract Length: 12 months * *Job Decription:-* *LinkedIn Profile (link)?* The Cybersecurity Operations Center Analyst is responsible for detecting, assessing and responding to cyber security events and incidents across the environment. The Analyst will work closely with peers, other internal/external teams and management in a 24x7 Cybersecurity Operations Center (CSOC) environment. The Analyst also is responsible for following processes and procedures as defined by Cybersecurity leadership and the Computer Incident Response Team (CIRT). *Responsibilities for this position may include but are not limited to:-* · Conduct network, endpoint, and log analysis by utilizing various consoles on a regular basis to analyze and triage cybersecurity events (e.g., SIEM, IPS, firewall, etc.) and perform continuous hunt across the environment. · Reconstruct cyber events, assess cyber threat and scope of impact, identify and track any internal lateral or external movement, and develop response solutions. · Interact with security community to obtain technical cyber threat intelligence. · Track cyber threat actors/campaigns based off technical analysis and open source/third party intelligence. · Research and track new exploits and cyber threats. · Lead containment of threats and remediation of environment during or after an incident. · Lead cursory and/or in-depth analysis (i.e. packet captures, endpoint behaviors, etc.), or collaborate with peers when appropriate for hand-offs/escalations. · Conduct analysis of malicious code and weaponized documents through behavioral analysis or reverse engineering. · Lead mitigations to address cyber threats and lead other incident response coordination and remediation activities. · Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs. · Monitor trends of compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline. · Enhance and tune detections and alerts and other cyber event correlation rules to reduce false positives. · Provide creative and innovative solutions to automate and enhance processes and capabilities. · Oversee execution of established operational processes and procedures by CSOC analysts to analyze, escalate, and lead remediation of security incidents. · Work with CSOC manager to develop, establish and execute incident response and escalation processes and procedures. · Collaborate with CSOC manager and analysts to provide reports to the Cybersecurity leadership team. · Train and assist other analysts on the policies and procedures of the CSOC. · Review their research, analysis and conclusions for completeness. · Provide 24x7 operational support for escalations on a rotating on-call shift basis *Required Qualifications:* · 5+ years of Cybersecurity experience in a security operations center with strong understanding of Cybersecurity frameworks and incident and security event management · Experience analyzing host and network based logged events (i.e. firewall, IPS/IDS, Windows, Web, proxy, and mail filtering) · Experience with SIEM technology and logging environments. · Demonstrated capability to work with little management oversight and must have strong personal initiative. · Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings and provide briefings to various levels of staff / management. · Ability to work in high pressure situations and within a team environment. · Experience with writing and editing technical documentation and operational procedures. · Demonstrated effective problem solving & analytical skills *Desired Qualifications**: * · Direct backgrund or exposure to cyber security operations · Knowledge of network monitoring, analysis, troubleshooting, and configuration control technologies · General networking understanding and/or experience to include understanding of TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB · Windows and UNIX/Linux command line scripting experience and programming experience. · Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). · Experience with forensics and malware analysis concepts and methods. · Familiarity or experience with the Cyber Kill Chain® methodology · Possession of one or more industry standard certification such as SANS GIAC/GCIA/GCIH/GCFA, CISSP, CISA, etc. or other network / system security certifications. Best Regards, *Ankit Bhardwaj(AB) – IT Recruiter* *Desk:* *6145037633* *E-Mail:* *an...@technocraftsol.com* <an...@technocraftsol.com> -- You received this message because you are subscribed to the Google Groups "Open Source Erp & Crm" group. To unsubscribe from this group and stop receiving emails from it, send an email to open-source-erp-crm+unsubscr...@googlegroups.com. To post to this group, send email to open-source-erp-crm@googlegroups.com. Visit this group at https://groups.google.com/group/open-source-erp-crm. For more options, visit https://groups.google.com/d/optout.