Position: Information Security Analyst (Backfill)


Location: Union County, NJ



Duration: 12+Months



Interview: Phone + skype or f2f



Immediate start







The role of the SOC Threat Intelligence/Incident Response Analyst is to
safeguard all critical infrastructure and information assets across the
company.







Responsibilities to include:



•         Focusing on detection, prevention & response to threats against
our enterprise.



•         Create, document and follow detailed operational process and
procedures to appropriately analyze, escalate, and assist in remediation of
all information security incidents.



•             Provide proactive security events analysis and threat
analytics.



•             Hunt for advanced cyber threats, conduct technical analysis
and assessments of incidents including malware analysis and packet level
analysis.



•             Define, build, test and implement correlation rules to
support the monitoring and enforcement of our security policies.



•             Monitoring of security events in the SIEM, as well as other
security feeds and then take appropriate action based on the company
security policies.



•             Documenting event analysis in sufficient detail that the
analysis process can be passed to other security personnel or subject
matter experts.



•             Understanding of common network services (TCP/IP, web, mail,
FTP, DNS etc.), vulnerabilities, and attack patterns is a must.



•             Knowledge of firewalls, intrusion detection/prevention
systems and various Operating Systems.



•             Experience with security assessment tools, Security
monitoring tools and GRC tools.



•             Assist with the investigation of security breaches as
necessary.


Knowledge, Skills, and Abilities:



•             Bachelor Degree in Computer Sciences, or equivalent prior
work experience in a related field.



•             One or more of the following security certifications is
required. (GCIH, GCIA, GAWN).



•             One or more of the following certifications is preferred
(Security+, Network+, CISSP).



•             8+ years in a computer related field, with 7+ in Information
Security.



•          3+ years of hands on incident response in a Security Operations
Center environment and be well versed on the Incident Response Phases



•         Familiarity with modern malware techniques including rootkits,
Trojans, browser helper objects and peer-to-peer software is a must.



•             Advanced knowledge of network security infrastructure, risk
analysis, data/voice communication systems, services and system/network
configurations. Network operations, design, and systems management



•             Strong knowledge of OWASP, NIST, PCI, SOX and best practices.



•             Strong security knowledge and conceptual understanding of
current technologies such as firewalls, VPNs, IDS/IPS and other security
devices.



•             Strong analytical skills (i.e., technical and non-technical
problem solving skills).



•             Must have outstanding written and verbal communication skills











-- 

 * Thanks and Regards*




*Tapan*

*Business Development Manager*

*Email*: *ta...@technocraftsol.com* <ta...@technocraftsol.com>

*Contact*:    *614-664-7644*

*Yahoo ID*:  *tapan_technocraft*

*Gmail ID:   **tapan.technocraft*



*Website*: www.technocraftsol.com

-- 
You received this message because you are subscribed to the Google Groups "Open 
Source Erp & Crm" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to open-source-erp-crm+unsubscr...@googlegroups.com.
To post to this group, send email to open-source-erp-crm@googlegroups.com.
Visit this group at http://groups.google.com/group/open-source-erp-crm.
For more options, visit https://groups.google.com/d/optout.

Reply via email to