Hello,
Hope you are doing great...!!! I am attaching a job description for your review. If you are interested so please revert me back with your updated resume. Please call me on *6145037633 *or e-mail me at *an...@technocraftsol.com* <an...@technocraftsol.com> *Job Title: Senior Cyber Security Analyst(USC or GC or GC EAD or H4 EAD only)* *Location: Charlotte NC* *Contract Length: 12 months * *Job Decription:-* *LinkedIn Profile (link)?* The Cybersecurity Operations Center Analyst is responsible for detecting, assessing and responding to cyber security events and incidents across the environment. The Analyst will work closely with peers, other internal/external teams and management in a 24x7 Cybersecurity Operations Center (CSOC) environment. The Analyst also is responsible for following processes and procedures as defined by Cybersecurity leadership and the Computer Incident Response Team (CIRT). *Responsibilities for this position may include but are not limited to:-* · Conduct network, endpoint, and log analysis by utilizing various consoles on a regular basis to analyze and triage cybersecurity events (e.g., SIEM, IPS, firewall, etc.) and perform continuous hunt across the environment. · Reconstruct cyber events, assess cyber threat and scope of impact, identify and track any internal lateral or external movement, and develop response solutions. · Interact with security community to obtain technical cyber threat intelligence. · Track cyber threat actors/campaigns based off technical analysis and open source/third party intelligence. · Research and track new exploits and cyber threats. · Lead containment of threats and remediation of environment during or after an incident. · Lead cursory and/or in-depth analysis (i.e. packet captures, endpoint behaviors, etc.), or collaborate with peers when appropriate for hand-offs/escalations. · Conduct analysis of malicious code and weaponized documents through behavioral analysis or reverse engineering. · Lead mitigations to address cyber threats and lead other incident response coordination and remediation activities. · Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs. · Monitor trends of compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline. · Enhance and tune detections and alerts and other cyber event correlation rules to reduce false positives. · Provide creative and innovative solutions to automate and enhance processes and capabilities. · Oversee execution of established operational processes and procedures by CSOC analysts to analyze, escalate, and lead remediation of security incidents. · Work with CSOC manager to develop, establish and execute incident response and escalation processes and procedures. · Collaborate with CSOC manager and analysts to provide reports to the Cybersecurity leadership team. · Train and assist other analysts on the policies and procedures of the CSOC. · Review their research, analysis and conclusions for completeness. · Provide 24x7 operational support for escalations on a rotating on-call shift basis *Required Qualifications:* · 5+ years of Cybersecurity experience in a security operations center with strong understanding of Cybersecurity frameworks and incident and security event management · Experience analyzing host and network based logged events (i.e. firewall, IPS/IDS, Windows, Web, proxy, and mail filtering) · Experience with SIEM technology and logging environments. · Demonstrated capability to work with little management oversight and must have strong personal initiative. · Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings and provide briefings to various levels of staff / management. · Ability to work in high pressure situations and within a team environment. · Experience with writing and editing technical documentation and operational procedures. · Demonstrated effective problem solving & analytical skills *Desired Qualifications**: * · Direct backgrund or exposure to cyber security operations · Knowledge of network monitoring, analysis, troubleshooting, and configuration control technologies · General networking understanding and/or experience to include understanding of TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB · Windows and UNIX/Linux command line scripting experience and programming experience. · Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). · Experience with forensics and malware analysis concepts and methods. · Familiarity or experience with the Cyber Kill Chain® methodology · Possession of one or more industry standard certification such as SANS GIAC/GCIA/GCIH/GCFA, CISSP, CISA, etc. or other network / system security certifications. Best Regards, *Ankit Bhardwaj(AB) – IT Recruiter* *Desk:* *6145037633* *E-Mail:* *an...@technocraftsol.com* <an...@technocraftsol.com> -- You received this message because you are subscribed to the Google Groups "SAP or Oracle Financials" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-or-oracle-financials+unsubscr...@googlegroups.com. To post to this group, send email to sap-or-oracle-financials@googlegroups.com. Visit this group at https://groups.google.com/group/sap-or-oracle-financials. For more options, visit https://groups.google.com/d/optout.