Dear *Professional*,


Hope you are doing great today...



This is *BABU, BDM FROM PANTAR SOLUTIONS INC*, we are an Information
Technology and Business Consulting firm specializing in Project-based
Solutions and Professional Staffing Services. Please have a look at below
position which is with our Client and let me know your interest ASAP. I
would really appreciate if you could send me your *MOST RECENT UPDATED
RESUME*:




*Title: Cyber Security Engineer (Sr. Incident Response Lead) with Azure/AWS
security, API, FaaS, Forensic capability and Automation,
AI, Splunk/Sort/Phantom Exp.Work Location: Charlotte, NC or Detroit, MI
(Hybrid)Duration: Till 12/31/2026 (with potential extensions)*


*Sr. Incident Response Lead*

*Top Skills:*

** Cloud experience – preferably Azure/AWS security experience, GCIA, GCIH,
or other GIAC certifications preferred;
** Forensic capability and Automation;
** Splunk/Sort/Phantom – practical experience.
**  AI;
** Able to participate in a rotating On-Call schedule approximately once a
month for after-hours information security events / incidents.
** Excellent communication skills – customer facing – calm – even demeanor
when challenged, team player who works well with others and works well
collaboratively. High EQ. Ethical Hacker skills.
** Incident commander - Lead calls, strong and varied technical
capabilities, social awareness – working with all levels, able to
prioritize.



*Job Description:*

The CSIRT Incident Response position at Client is a member of the
Information Protection and Risk Management team and works closely with
other members of the IPRM program to develop and implement a comprehensive
approach to the management of security risks at Client. The candidate will
work with subject matter experts drawn from other teams within IPRM to
manage the response to cyber security threats and incidents.

This role is also responsible for working with other team members in
responding to security incidents according to established policies and best
practices. It will also require strong organizational, workflow / process
flow, Use Case development, and documentation capabilities.

*Job Responsibilities*

   - Lead investigations into information security events / incidents
   - Drive efforts towards containment of threats and remediation of
   environment during or after an incident
   - Maintain and improve Client’s CyberSecurity Incident Response plan
   - Lead audit management responsibilities to ensure identified gaps are
   addressed in respect to required timing to reduce risk

· Contribute to the development of use case and prioritization of use case
development

· Contribute to the process improvement process through development of new
detections and changes in the response processes

   - Perform complex security investigations and root cause analyses
   - Participate in a rotating On-Call schedule for after hours information
   security events / incidents
   - Perform Post Incident reviews and After Action Reports
   - Assemble and coordinate with technical teams and third-party vendors
   to resolve incidents as quickly and efficiently as possible
   - Ensure that all incidents are recorded and tracked to meet audit and
   legal requirements where necessary
   - Function as stakeholder to strengthen the overall Response framework
   inclusive of SOC and CSIRT
   - Serve as escalation point for the PCI environment including guidance
   for monitoring and response

*Qualifications*

   - Minimum of five years information security specific experience
   - Deep understanding of network protocols and troubleshooting
   - Deep understanding of server and workstation operating systems
   - Broad understanding and experience managing security mitigation
   solutions at all layers and protocols
   - Experience securing multi-cloud environments, FaaS and CI/CD pipelines
   - Experience securing Applications and APIs
   - Bachelor\'s degree in information systems or equivalent experience
   - Ability to analyze large data sets and unstructured data for the
   purpose of identifying trends and anomalies indicative of malicious
   activity, as well as demonstrated capability to learn and develop new
   techniques
   - Strong knowledge of current security threats, techniques, and
   landscape, as well as a dedicated and self-driven desire to research
   current information security landscape
   - Ability to research, develop, and keep abreast of tools, techniques,
   and process improvements in support of security detection and analysis in
   accordance with current and emerging threat and attack vectors
   - Ability to incorporate threat intel data into existing security
   solutions to monitor or prevent current threat actors
   - Experience with cyber hunting practices/exercises using SIEM,
   Enterprise search tools, or other solutions
   - Excellent communications skills (verbal and written) are required
   - Excellent problem-solving skills and troubleshooting skills with a
   strong attention to detail
   - Ability to interact with personnel at all levels across the
   organization and to comprehend business imperatives


*PLEASE NOTE:*

If for any reason this does not interest you or you felt uncomfortable by
any part of this email, I sincerely apologize. Please consider this E-mail
as a request for referrals and feel free in forward this email to anyone
whom you might find a fit.


*Thanks & Regards,*

Babu
Pantar Solutions Inc
1908 Cox Rd, Weddington, NC  28104
Email: babu (dot) s (at) pantarsolutions (dot) com
<http://pantarsolutions.com>

-- 
You received this message because you are subscribed to the Google Groups 
"project managment" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/project-managment/CAHynwgph5MV08_8G5EsS55AB8CeFUHSAw%2B_mCEcBncSshHGfBA%40mail.gmail.com.

Reply via email to