Cloud Security Incident Response

5 - 7 years experience  •  Telecommunications

Salary depends on experience
Posted on 05/16/18
Virtual / Travel
5 - 7 years experience
Telecommunications
Salary depends on experience
Posted on 05/16/18

Responsibilities

  • ·         Coordinate the CSIRT efforts across multiple business units during response
  • ·         Perform hunting exercises using threat intelligence, analysis of anomalous log data and results of historical events and data to detect and response to threats
  • ·         Develop anomaly detection dashboards and reports to identify potential threats, suspicious activity, and intrusions
  • ·         Monitor for security indicators by correlating and analyzing a variety of application, network and host-based security logs and determining the correct remediation actions and escalation paths for each incident
  • ·         Assist with the development of processes and procedures to improve security operations functions, incident response times, analysis of incidents, and overall SOC functions
  • ·         Create repeatable processes for continuous testing and monitoring of IOCs following a proven methodology you help define
  • ·         Develop scripts, processes and content to improve detective capabilities
  • ·         Knowledge of the chain of custody process and properly securing evidence
  • ·         Research industry trends, identify ongoing security threats, analyze new security testing tools, and provide recommendations on the need and usefulness of services and/or products
  • ·         Evaluate and recommend new and emerging security solutions and technologies to issues
  • ·         Effectively communicate security concepts with both technical and non-technical individuals
  • ·         Provide information regarding intrusion events, security incidents, and other threat indications and warning information to teams and leadership as part of incident response
  • ·         Deliver self-service security metric data of discovery, triage and trending analysis of team findings
  • ·         Author post mortem reports to be provided to senior leadership following an intrusion or red team engagement
  • ·         Participate in Red/Blue/Purple team activities

 

Qualifications

  • ·         Bachelor’s Degree in Information Assurance, Security, Management Information Systems, Risk Management or equivalent work experience acceptable
  • ·         2-3+ years of related cybersecurity architecture, engineering, or SOC work experience (monitoring, detection, incident response, forensics)
  • ·         Ability to write scripts/code using Python, Perl, Powershell, or an equivalent language
  • ·         Excellent written and verbal communications, including presentation skills, are important to be successful in this role
  • ·         Proven ability to effectively communicate with all levels of the organization, as well as with external parties
  • ·         Experience with forensics tools such as X-Ways, F-Response, Volatility and Rekall
  • ·         Red/Blue team experience turning findings into actionable detections and mitigations
  • ·         Preferred knowledge of current advanced adversary TTP’s and experience responding to ATP attacks
  • ·         Understanding of privilege escalation, persistence, and lateral movement techniques
  • ·         Understanding of host and network Incident Response processes, tasks, and tools
  • ·         Excellent customer service skills required
  • ·         Knowledge of operational security tools and practices (e.g. IDS, firewalls, & 3rd-party security products)
  • ·         Ability to both work independently with minimal direction and to collaborate effectively with local and remote teams with a strong customer focus
  • ·         Experience working in a large cloud or Internet software company preferred.
  • ·         Be available on an on-call basis to respond to pending issues or problems arising during non-business hours and provide support and response

 

 

 

Detailed Description and Job Requirements

 Design, develop, troubleshoot and debug software programs for databases, applications, tools, networks etc.

As a member of the software engineering division, you will take an active role in the definition and evolution of standard practices and procedures. You will be responsible for defining and developing software for tasks associated with the developing, designing and debugging of software applications or operating systems.

Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. Leading contributor individually and as a team member, providing direction and mentoring to others. BS or MS degree or equivalent experience relevant to functional area. 7 years of software engineering or related experience.

180002IU

Not the right job?
Join Ladders to find it.
With a free Ladders account, you can find the best jobs for you and be found by over 20,0000 recruiters.