*Hi Associates,* *Greetings for the day...*
*Client: World Bank* *Market rate is open * *Position: Incident Response - Senior Incident Handler * * Location: Washington, DC* Roles and Responsibilities: Conduct thorough investigative actions based on security events and remediate as dictated by standard operating procedures. Participate in all the phases of Incident Response process, including detection, containment, eradication, and post-incident reporting. Record detailed Incident Response activities in the Incident Case Management System. Review automated daily security reports of key security controls, identify anomalies and, escalate critical security events to the appropriate stakeholders and follow-up as required. Wherever required perform memory forensics. Document vulnerabilities and Exploits used while analyzing a malware. Analyze, evaluate, and document malicious code behavior. Identify commonalities and differences between malware samples for purposes of grouping or classifying for attribution purposes. Develop tools to identify a 0-day malware based on various characteristics of a file format. Assist the COT lead in developing Incident Response Toolkit. Selection Criteria: Minimum 7 years of Information Security experience required, out of which the individual has worked with CSIRT for a minimum period of 2 years and at least 2 years conducting some form of malware analysis. Understanding of how operating systems work and how malware exploits them. Understanding of network traffic and be able to analyze network traffic introduced by the malware. Past exposure to APT type malware and financial crime malware such as Zeus and Spyeye etc. Experience in researching vulnerabilities and exploits. Experience in writing quick scripts using Perl, Python, or TCL/TK. Thorough understanding of Windows Internals and memory management. Knowledge of common hacking tools and techniques. Experience in understanding and analyzing various log formats from various sources. Experience in analyzing reports generated of SIM/SEM tools. Proficient experience with the following concepts and related toolsets: - Network sniffers - Process analysis tools - Registry analysis tools - File analysis tools - Memory analysis tools Individuals who have worked in night shift and in a security operations center would be preferred. GIAC Certified Intrusion Analyst (GCIA) or GIAC Certified Incident Handler (GCIH). Certified Information Systems Security Professional (CISSP). *Thanks & Regards* *Krish* *Sales Manager* Gtlak/yahoo : grk2403 *Ph:(925) 973-0000 x 219(Off) | Fax: (408) 273-6002* *Email: **r...@allianceit.com* <va...@allianceit.com>* |http://www.allianceit.com <http://www.allianceit.com> * -- You received this message because you are subscribed to the Google Groups "SAP or Oracle Financials" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-or-oracle-financials+unsubscr...@googlegroups.com. To post to this group, send email to email@example.com. Visit this group at http://groups.google.com/group/sap-or-oracle-financials. For more options, visit https://groups.google.com/d/optout.