*Sure shot interview.*


*BACKFILL*



*Position : **Information Security Analyst*

*Location: Union County, NJ(NEAR BY)*

*Duration: 12+Months*

*Interview: Phone + Skype or f2f*

*Immediate start*





The role of the SOC Threat Intelligence/Incident Response Analyst is to
safeguard all critical infrastructure and information assets across the
company.



*Responsibilities to include:*

•         Focusing on detection, prevention & response to threats against
our enterprise.

•         Create, document and follow detailed operational process and
procedures to appropriately analyze, escalate, and assist in remediation of
all information security incidents.

•             Provide proactive security events analysis and threat
analytics.

•             Hunt for advanced cyber threats, conduct technical analysis
and assessments of incidents including malware analysis and packet level
analysis.

•             Define, build, test and implement correlation rules to
support the monitoring and enforcement of our security policies.

•             Monitoring of security events in the SIEM, as well as other
security feeds and then take appropriate action based on the company
security policies.

•             Documenting event analysis in sufficient detail that the
analysis process can be passed to other security personnel or subject
matter experts.

•             Understanding of common network services (TCP/IP, web, mail,
FTP, DNS etc.), vulnerabilities, and attack patterns is a must.

•             Knowledge of firewalls, intrusion detection/prevention
systems and various Operating Systems.

•             Experience with security assessment tools, Security
monitoring tools and GRC tools.

•             Assist with the investigation of security breaches as
necessary.

.



*Knowledge, Skills, and Abilities:*

•             Bachelor Degree in Computer Sciences, or equivalent prior
work experience in a related field.

•             One or more of the following security certifications is
required. (GCIH, GCIA, GAWN).

•             One or more of the following certifications is preferred
(Security+, Network+, CISSP).

•             8+ years in a computer related field, with 7+ in Information
Security.

•          3+ years of hands on incident response in a Security Operations
Center environment and be well versed on the Incident Response Phases

•         Familiarity with modern malware techniques including rootkits,
Trojans, browser helper objects and peer-to-peer software is a must.

•             Advanced knowledge of network security infrastructure, risk
analysis, data/voice communication systems, services and system/network
configurations. Network operations, design, and systems management

•             Strong knowledge of OWASP, NIST, PCI, SOX and best practices.

•             Strong security knowledge and conceptual understanding of
current technologies such as firewalls, VPNs, IDS/IPS and other security
devices.

•             Strong analytical skills (i.e., technical and non-technical
problem solving skills).

•             Must have outstanding written and verbal communication skills



*Thanks and Regards,*



*Ishant*

Sr. IT Recruiter

*Email*: *[email protected]* <[email protected]>

*Contact*: *614-664-7813*

*Yahoo ID / Gmail ID*:  *ishanttechnocraft*



*Website*: www.technocraftsol.com







*Note: Technocraft Solutions LLC works with Direct Client’s and Preferred
Vendors Nationwide. *



*Your confirmation would means that you understand the level of Technocraft
Solutions LLC association for the mentioned project and will not approach
Technocraft Solutions LLC Client directly*

-- 
You received this message because you are subscribed to the Google Groups 
"Oracle-Projects" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/oracle-projects.
For more options, visit https://groups.google.com/d/optout.

Reply via email to