*Sure shot interview.*
*BACKFILL* *Position : **Information Security Analyst* *Location: Union County, NJ(NEAR BY)* *Duration: 12+Months* *Interview: Phone + Skype or f2f* *Immediate start* The role of the SOC Threat Intelligence/Incident Response Analyst is to safeguard all critical infrastructure and information assets across the company. *Responsibilities to include:* • Focusing on detection, prevention & response to threats against our enterprise. • Create, document and follow detailed operational process and procedures to appropriately analyze, escalate, and assist in remediation of all information security incidents. • Provide proactive security events analysis and threat analytics. • Hunt for advanced cyber threats, conduct technical analysis and assessments of incidents including malware analysis and packet level analysis. • Define, build, test and implement correlation rules to support the monitoring and enforcement of our security policies. • Monitoring of security events in the SIEM, as well as other security feeds and then take appropriate action based on the company security policies. • Documenting event analysis in sufficient detail that the analysis process can be passed to other security personnel or subject matter experts. • Understanding of common network services (TCP/IP, web, mail, FTP, DNS etc.), vulnerabilities, and attack patterns is a must. • Knowledge of firewalls, intrusion detection/prevention systems and various Operating Systems. • Experience with security assessment tools, Security monitoring tools and GRC tools. • Assist with the investigation of security breaches as necessary. . *Knowledge, Skills, and Abilities:* • Bachelor Degree in Computer Sciences, or equivalent prior work experience in a related field. • One or more of the following security certifications is required. (GCIH, GCIA, GAWN). • One or more of the following certifications is preferred (Security+, Network+, CISSP). • 8+ years in a computer related field, with 7+ in Information Security. • 3+ years of hands on incident response in a Security Operations Center environment and be well versed on the Incident Response Phases • Familiarity with modern malware techniques including rootkits, Trojans, browser helper objects and peer-to-peer software is a must. • Advanced knowledge of network security infrastructure, risk analysis, data/voice communication systems, services and system/network configurations. Network operations, design, and systems management • Strong knowledge of OWASP, NIST, PCI, SOX and best practices. • Strong security knowledge and conceptual understanding of current technologies such as firewalls, VPNs, IDS/IPS and other security devices. • Strong analytical skills (i.e., technical and non-technical problem solving skills). • Must have outstanding written and verbal communication skills *Thanks and Regards,* *Ishant* Sr. IT Recruiter *Email*: *[email protected]* <[email protected]> *Contact*: *614-664-7813* *Yahoo ID / Gmail ID*: *ishanttechnocraft* *Website*: www.technocraftsol.com *Note: Technocraft Solutions LLC works with Direct Client’s and Preferred Vendors Nationwide. * *Your confirmation would means that you understand the level of Technocraft Solutions LLC association for the mentioned project and will not approach Technocraft Solutions LLC Client directly* -- You received this message because you are subscribed to the Google Groups "Oracle-Projects" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/oracle-projects. For more options, visit https://groups.google.com/d/optout.
