Position: Information Security Analyst (Backfill)


Location: Union County, NJ



Duration: 12+Months



Interview: Phone + skype or f2f



Immediate start







The role of the SOC Threat Intelligence/Incident Response Analyst is to
safeguard all critical infrastructure and information assets across the
company.







Responsibilities to include:



•         Focusing on detection, prevention & response to threats against
our enterprise.



•         Create, document and follow detailed operational process and
procedures to appropriately analyze, escalate, and assist in remediation of
all information security incidents.



•             Provide proactive security events analysis and threat
analytics.



•             Hunt for advanced cyber threats, conduct technical analysis
and assessments of incidents including malware analysis and packet level
analysis.



•             Define, build, test and implement correlation rules to
support the monitoring and enforcement of our security policies.



•             Monitoring of security events in the SIEM, as well as other
security feeds and then take appropriate action based on the company
security policies.



•             Documenting event analysis in sufficient detail that the
analysis process can be passed to other security personnel or subject
matter experts.



•             Understanding of common network services (TCP/IP, web, mail,
FTP, DNS etc.), vulnerabilities, and attack patterns is a must.



•             Knowledge of firewalls, intrusion detection/prevention
systems and various Operating Systems.



•             Experience with security assessment tools, Security
monitoring tools and GRC tools.



•             Assist with the investigation of security breaches as
necessary.


Knowledge, Skills, and Abilities:



•             Bachelor Degree in Computer Sciences, or equivalent prior
work experience in a related field.



•             One or more of the following security certifications is
required. (GCIH, GCIA, GAWN).



•             One or more of the following certifications is preferred
(Security+, Network+, CISSP).



•             8+ years in a computer related field, with 7+ in Information
Security.



•          3+ years of hands on incident response in a Security Operations
Center environment and be well versed on the Incident Response Phases



•         Familiarity with modern malware techniques including rootkits,
Trojans, browser helper objects and peer-to-peer software is a must.



•             Advanced knowledge of network security infrastructure, risk
analysis, data/voice communication systems, services and system/network
configurations. Network operations, design, and systems management



•             Strong knowledge of OWASP, NIST, PCI, SOX and best practices.



•             Strong security knowledge and conceptual understanding of
current technologies such as firewalls, VPNs, IDS/IPS and other security
devices.



•             Strong analytical skills (i.e., technical and non-technical
problem solving skills).



•             Must have outstanding written and verbal communication skills











-- 

 * Thanks and Regards*




*Tapan*

*Business Development Manager*

*Email*: *ta...@technocraftsol.com* <ta...@technocraftsol.com>

*Contact*:    *614-664-7644*

*Yahoo ID*:  *tapan_technocraft*

*Gmail ID:   **tapan.technocraft*



*Website*: www.technocraftsol.com

-- 
You received this message because you are subscribed to the Google Groups "SAP 
or Oracle Financials" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-or-oracle-financials+unsubscr...@googlegroups.com.
To post to this group, send email to sap-or-oracle-financials@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-or-oracle-financials.
For more options, visit https://groups.google.com/d/optout.

Reply via email to