Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Associate, Direct Response Jobs
Recruited by Americares 8 months ago Address United States
Information Security Operations Center And Incident Response Manager (Remote)
Recruited by Crane Company 9 months ago Address United States
Senior Incident Response Analyst
Recruited by Xerox 10 months ago Address United States
Cyber Security Analyst - Incident Response
Recruited by Convergenz 10 months ago Address United States
Rapid Response Jobs
Recruited by Stefanini Group 10 months ago Address United States
Senior Cybersecurity Incident Response Analyst
Recruited by Xerox 10 months ago Address United States
Copywriter, Direct Response Tv
Recruited by hims & hers 11 months ago Address United States
Incident Response Analyst Jobs
Recruited by Foregenix 11 months ago Address United States

Digital Forensics And Incident Response Analyst

Company

Connecting Experts

Address United States
Employment type FULL_TIME
Salary
Category Computer and Network Security
Expires 2023-08-23
Posted at 9 months ago
Job Description

We are currently seeking a Digital Forensics and Incident Response Analyst for a remote role based in United States.


KEY RESPONSIBILITES:


  • Use cutting-edge technology to do search and investigative work to look at endpoint and network-based activity, such as Endpoint Detection & Response tools, SEIM-based log analysis, and full packet capture
  • Implement remediation plans in response to incidents in collaboration with important stakeholders
  • Oversee incident response tasks and train junior staff
  • Create security-related content, scripts, tools, or techniques to improve incident investigation procedures
  • Perform host-based forensics, network forensics, log analysis, triage, limited malware analysis, and incident response in support of these activities
  • Author Standard Operating Procedures (SOPs) and training documentation when needed
  • Conduct thorough investigations, pinpoint root causes, and share information with all relevant parties, including technical personnel and leadership
  • Probably anticipated to serve as the main point of contact for an outside agency
  • Produces end-of-shift reports for documentation and information sharing with incoming analysts


QUALIFICATIONS:


  • Full understanding of Tier 1 responsibilities/duties and how the duties feed into Tier 2. The ability to take lead on incident research when appropriate and be able to mentor junior analysts
  • Forensic and Malware Analysis
  • Deep packet and log analysis
  • Bachelor-s degree or equivalent experience
  • 8 years of general experience, with a minimum of 6 years as an incident responder/handler (less experience may be taken into account if there is extra schooling, certificates, or other relevant characteristics)
  • Knowledge and experience with scripting and programming (Python, PERL, etc.) are also highly preferred
  • Advanced knowledge of TCP/IP protocols
  • Knowledge of Windows, Linux operating systems
  • Knowledge of Intrusion Detection Systems (IDS) and SIEM technologies; Splunk or ArcSight experience
  • Cyber Threat and Intelligence gathering, and analysis preferred