Position: Information Security Analyst (Backfill)
Location: Union County, NJ Duration: 12+Months Interview: Phone + skype or f2f Immediate start The role of the SOC Threat Intelligence/Incident Response Analyst is to safeguard all critical infrastructure and information assets across the company. Responsibilities to include: • Focusing on detection, prevention & response to threats against our enterprise. • Create, document and follow detailed operational process and procedures to appropriately analyze, escalate, and assist in remediation of all information security incidents. • Provide proactive security events analysis and threat analytics. • Hunt for advanced cyber threats, conduct technical analysis and assessments of incidents including malware analysis and packet level analysis. • Define, build, test and implement correlation rules to support the monitoring and enforcement of our security policies. • Monitoring of security events in the SIEM, as well as other security feeds and then take appropriate action based on the company security policies. • Documenting event analysis in sufficient detail that the analysis process can be passed to other security personnel or subject matter experts. • Understanding of common network services (TCP/IP, web, mail, FTP, DNS etc.), vulnerabilities, and attack patterns is a must. • Knowledge of firewalls, intrusion detection/prevention systems and various Operating Systems. • Experience with security assessment tools, Security monitoring tools and GRC tools. • Assist with the investigation of security breaches as necessary. Knowledge, Skills, and Abilities: • Bachelor Degree in Computer Sciences, or equivalent prior work experience in a related field. • One or more of the following security certifications is required. (GCIH, GCIA, GAWN). • One or more of the following certifications is preferred (Security+, Network+, CISSP). • 8+ years in a computer related field, with 7+ in Information Security. • 3+ years of hands on incident response in a Security Operations Center environment and be well versed on the Incident Response Phases • Familiarity with modern malware techniques including rootkits, Trojans, browser helper objects and peer-to-peer software is a must. • Advanced knowledge of network security infrastructure, risk analysis, data/voice communication systems, services and system/network configurations. Network operations, design, and systems management • Strong knowledge of OWASP, NIST, PCI, SOX and best practices. • Strong security knowledge and conceptual understanding of current technologies such as firewalls, VPNs, IDS/IPS and other security devices. • Strong analytical skills (i.e., technical and non-technical problem solving skills). • Must have outstanding written and verbal communication skills -- * Thanks and Regards* *Tapan* *Business Development Manager* *Email*: *ta...@technocraftsol.com* <ta...@technocraftsol.com> *Contact*: *614-664-7644* *Yahoo ID*: *tapan_technocraft* *Gmail ID: **tapan.technocraft* *Website*: www.technocraftsol.com -- You received this message because you are subscribed to the Google Groups "SAP or Oracle Financials" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-or-oracle-financials+unsubscr...@googlegroups.com. To post to this group, send email to firstname.lastname@example.org. Visit this group at http://groups.google.com/group/sap-or-oracle-financials. For more options, visit https://groups.google.com/d/optout.