Senior Security Analyst -Threat Response L3

Job Description
Key Responsibilities:
The SOC Threat Response Analyst role is key part of the SOC. Candidates in this role will be responsible for conducting incident response operations according to documented procedures and industry best practices. Candidates in this role must have excellent communication skills; able to interact with executive levels throughout the company. Must have extensive experience in multiple security areas such as SIEM, IDS, APT, and WAF. Candidates will be required to participate in multiple intelligence communities and be able to disseminate pertinent information throughout the SOC. Ideal candidates should have extensive experience in Linux and Windows operating systems, deep knowledge of networking and attack methods such as SQLi and pivoting. Enthusiasm and interest in Information Security must be displayed.
Job Requirements:

  • Provide incident investigation as per Security Incident Management Process / Guidelines
  • Drives containment strategy during data loss or breach events
  • Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs)
  • Malware outbreak incident handling and remediation
  • Execute incident handling program
  • Co-ordinate with IT, security operations and other teams for remediation and trigger forensics process as appropriate
  • Perform Root cause analysis (RCA) for the incidents and update the knowledge management
  • Works directly with data asset owners and business response plan owners during high severity incidents
  • Tuning of IDS, proxy policy, in-line malware tools based on threat feeds, trust and reputation data, incidents, or vulnerabilities and exploits of downstream systems
  • Provide tuning recommendations to administrators based on findings during investigations or threat information reviews


Required Technical and Professional Expertise

  • Strong Analytical and Problem Solving Skills
  • Knowledge of network security zones, Firewall configurations, IDS policies
  • Knowledge of systems communications from Layer 1 to 7
  • Experience with Systems Administration, Middleware, and Application Administration
  • Experience with Network and Network Security tools administration
  • Knowledge of log formats and ability to aggregate and parse log data for syslog, http logs, DB logs for investigation purposes
  • In-depth experience with log search tools and SIEM tools such as HP Arcsight, Splunk, Mcaffee, usage of regular expressions and natural language queries
  • In-depth knowledge of packet capture and analysis
  • Experience with Security Assessment tools (NMAP, Nessus)
  • Ability to make create a containment strategy and execute


Preferred Tech and Prof Experience

Preferred:
  • Intrusion Detection In Depth - SEC503 (GCIA certification) or equivalent
  • Hacker Techniques, Exploits & Incident Handling - SEC504 (optional GCIH certification) or equivalent
  • GIAC Continuous Monitoring (optional GMON certification) or equivalent
  • Advanced digital forensics and Incident Response - FOR 508 (Optional GCFA certification) or equivalent
Recommended:
  • Computer Forensic Investigation such as Windows Forensic Analysis FOR408 - (Optional GCFE certification)
  • Perimeter Protection In Depth - SEC502 (optional GCFW certification)
  • Advanced Security Essentials - SEC501 (optional GCED certification)


EO Statement
IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.


Back to top