Position: Information Security Analyst (Backfill)
Location: Union County, NJ Duration: 12+Months Interview: Phone + skype or f2f Immediate start The role of the SOC Threat Intelligence/Incident Response Analyst is to safeguard all critical infrastructure and information assets across the company. Responsibilities to include: • Focusing on detection, prevention & response to threats against our enterprise. • Create, document and follow detailed operational process and procedures to appropriately analyze, escalate, and assist in remediation of all information security incidents. • Provide proactive security events analysis and threat analytics. • Hunt for advanced cyber threats, conduct technical analysis and assessments of incidents including malware analysis and packet level analysis. • Define, build, test and implement correlation rules to support the monitoring and enforcement of our security policies. • Monitoring of security events in the SIEM, as well as other security feeds and then take appropriate action based on the company security policies. • Documenting event analysis in sufficient detail that the analysis process can be passed to other security personnel or subject matter experts. • Understanding of common network services (TCP/IP, web, mail, FTP, DNS etc.), vulnerabilities, and attack patterns is a must. • Knowledge of firewalls, intrusion detection/prevention systems and various Operating Systems. • Experience with security assessment tools, Security monitoring tools and GRC tools. • Assist with the investigation of security breaches as necessary. Knowledge, Skills, and Abilities: • Bachelor Degree in Computer Sciences, or equivalent prior work experience in a related field. • One or more of the following security certifications is required. (GCIH, GCIA, GAWN). • One or more of the following certifications is preferred (Security+, Network+, CISSP). • 8+ years in a computer related field, with 7+ in Information Security. • 3+ years of hands on incident response in a Security Operations Center environment and be well versed on the Incident Response Phases • Familiarity with modern malware techniques including rootkits, Trojans, browser helper objects and peer-to-peer software is a must. • Advanced knowledge of network security infrastructure, risk analysis, data/voice communication systems, services and system/network configurations. Network operations, design, and systems management • Strong knowledge of OWASP, NIST, PCI, SOX and best practices. • Strong security knowledge and conceptual understanding of current technologies such as firewalls, VPNs, IDS/IPS and other security devices. • Strong analytical skills (i.e., technical and non-technical problem solving skills). • Must have outstanding written and verbal communication skills -- * Thanks and Regards* *Tapan* *Business Development Manager* *Email*: *ta...@technocraftsol.com* <ta...@technocraftsol.com> *Contact*: *614-664-7644* *Yahoo ID*: *tapan_technocraft* *Gmail ID: **tapan.technocraft* *Website*: www.technocraftsol.com -- You received this message because you are subscribed to the Google Groups "Open Source Erp & Crm" group. To unsubscribe from this group and stop receiving emails from it, send an email to open-source-erp-crm+unsubscr...@googlegroups.com. To post to this group, send email to open-source-erp-crm@googlegroups.com. Visit this group at http://groups.google.com/group/open-source-erp-crm. For more options, visit https://groups.google.com/d/optout.