Incident Response Analyst

Bechtel Plant Machinery, Inc   •  

Glendale, AZ

Industry: Manufacturing


Less than 5 years

Posted 37 days ago

This job is no longer available.

As an Incident Response Analyst you will assist the team responsible for situational security awareness by pulling together information from a variety of systems and normalizing and correlating the information. The team provides real-time (or near real-time) detection and reaction services for information security incidents within the Bechtel enterprise.

Must be a US Citizen.

Security Operations Center (SOC) personnel duties include but are not limited to:

  • Provide detection and response to securityevents and incidents within the Bechtel Enterprise Network
  • Thorough investigation of security alerts generated by our detection mechanisms (IDS, user reported, custom alerts, etc.)
  • Utilize industry standard network and host forensic tools in order to fully understand the scope of an incident
  • Work the full ticket lifecycle; handle every step of the alert, from detection to remediation
  • Handle user reported cases of potential phishing, and spear phishing campaigns
  • Research, and analyze wide variety of commodity and APT based malware and techniques
  • Search our existing infrastructure for signs of malware, and malicious events not detected by our existing security controls
  • Help develop, implement, and maintain SOC policies, processes and procedures

Incident Response Analysts will be working with enterprise forensic capable systems, log analysis systems, and network collection systems to facilitate response to incidents on a global scale. You will work with industry respected malware, network and Incident Response analysts to coordinate a best in class response to computer related incidents.

Shift hours: Sunday through Wednesday, 10:00 pm PDT to 8:30 am PDT

Basic Qualifications:

Skill Level 1:

  • At least 3months ofexperiencewith at least two of the following:
    • Network traffic tools, techniques and analysis
    • Host forensics tools, techniques and analysis
    • Malware reverse engineering tools, techniques and analysis
    • IDS & IPS technologies, both signature and behavior based
    • Windows event log analysis

Skill Level 2:

  • At least one year of Scripting/Coding experience in Python, C, or JavaScript
  • At least one year of experience of Host Forensics, Malware Reverse Engineering, or Network Forensics
  • Bachelor’s degree in Information Security, Computer Science, Information Technology or a related degree

Required Skills:

  • Passion for all things Information Technology and Information Security
  • Natural curiosity and ability to learn new skills quickly
  • Strong analytical, documentation, and communication skills
  • Experience with trouble ticketing and change management tools
  • Must be able to computer