Hello,


Hope you are doing great...!!!



I am attaching a job description for your review. If you are interested so
please revert me back with your updated resume. Please call me on  *6145037633
*or e-mail me at *an...@technocraftsol.com* <an...@technocraftsol.com>



*Job Title:                  Senior Cyber Security Analyst(USC or GC or GC
EAD or H4 EAD only)*

*Location:                  Charlotte NC*

*Contract Length:       12 months *


*Job Decription:-*

*LinkedIn Profile (link)?*

The Cybersecurity Operations Center Analyst is responsible for detecting,
assessing and responding to cyber security events and incidents across the
environment. The Analyst will work closely with peers, other
internal/external teams and management in a 24x7 Cybersecurity Operations
Center (CSOC) environment. The Analyst also is responsible for following
processes and procedures as defined by Cybersecurity leadership and the
Computer Incident Response Team (CIRT).

*Responsibilities for this position may include but are not limited to:-*

·         Conduct network, endpoint, and log analysis by utilizing various
consoles on a regular basis to analyze and triage cybersecurity events
(e.g., SIEM, IPS, firewall, etc.) and perform continuous hunt across the
environment.

·         Reconstruct cyber events, assess cyber threat and scope of
impact, identify and track any internal lateral or external movement, and
develop response solutions.

·         Interact with security community to obtain technical cyber threat
intelligence.

·         Track cyber threat actors/campaigns based off technical analysis
and open source/third party intelligence.

·         Research and track new exploits and cyber threats.

·         Lead containment of threats and remediation of environment during
or after an incident.

·         Lead cursory and/or in-depth analysis (i.e. packet captures,
endpoint behaviors, etc.), or collaborate with peers when appropriate for
hand-offs/escalations.

·         Conduct analysis of malicious code and weaponized documents
through behavioral analysis or reverse engineering.

·         Lead mitigations to address cyber threats and lead other incident
response coordination and remediation activities.

·         Communicate and report on key intelligence, analysis and response
activities, relevant metrics, and KPIs.

·         Monitor trends of compromise, intrusion, deficiency, significant
event or threat to the security posture and security baseline.

·         Enhance and tune detections and alerts and other cyber event
correlation rules to reduce false positives.

·         Provide creative and innovative solutions to automate and enhance
processes and capabilities.

·         Oversee execution of established operational processes and
procedures by CSOC analysts to analyze, escalate, and lead remediation of
security incidents.

·         Work with CSOC manager to develop, establish and execute incident
response and escalation processes and procedures.

·         Collaborate with CSOC manager and analysts to provide reports to
the Cybersecurity leadership team.

·         Train and assist other analysts on the policies and procedures of
the CSOC.

·         Review their research, analysis and conclusions for completeness.

·         Provide 24x7 operational support for escalations on a rotating
on-call shift basis

*Required Qualifications:*

·         5+ years of Cybersecurity experience in a security operations
center with strong understanding of Cybersecurity frameworks and incident
and security event management

·         Experience analyzing host and network based logged events
(i.e. firewall,
IPS/IDS, Windows, Web, proxy, and mail filtering)

·         Experience with SIEM technology and logging environments.

·         Demonstrated capability to work with little management oversight
and must have strong personal initiative.

·         Motivated self-starter with strong written and verbal
communication skills, and the ability to create complex technical reports
on analytic findings and provide briefings to various levels of staff /
management.

·         Ability to work in high pressure situations and within a team
environment.

·         Experience with writing and editing technical documentation and
operational procedures.

·         Demonstrated effective problem solving & analytical skills

*Desired Qualifications**: *

·         Direct backgrund or exposure to cyber security operations

·         Knowledge of network monitoring, analysis, troubleshooting, and
configuration control technologies

·         General networking understanding and/or experience to include
understanding of TCP/IP communications & knowledge of how common protocols
and applications work at the network level, including DNS, HTTP, and SMB

·         Windows and UNIX/Linux command line scripting experience and
programming experience.

·         Demonstrated understanding of the life cycle of network threats,
attacks, attack vectors and methods of exploitation with an understanding
of intrusion set tactics, techniques and procedures (TTPs).

·         Experience with forensics and malware analysis concepts and
methods.

·         Familiarity or experience with the Cyber Kill Chain® methodology

·         Possession of one or more industry standard certification such as
SANS GIAC/GCIA/GCIH/GCFA, CISSP, CISA, etc. or other network / system
security certifications.

Best Regards,

*Ankit Bhardwaj(AB) – IT Recruiter*



*Desk:*    *6145037633*

*E-Mail:* *an...@technocraftsol.com* <an...@technocraftsol.com>

-- 
You received this message because you are subscribed to the Google Groups "SAP 
or Oracle Financials" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-or-oracle-financials+unsubscr...@googlegroups.com.
To post to this group, send email to sap-or-oracle-financials@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-or-oracle-financials.
For more options, visit https://groups.google.com/d/optout.

Reply via email to