Client Company
Technical Security Analyst
Client Company, San Jose, California, United States, 95199
Seeking a Technical Security Analyst to lead staff in the implementation & execution of technical aspects of the clients' enterprise security plan. Will act as the SME on security issues & projects so ESEC team members can increase their security knowledge. Must have strong security incident response experience & exposure to forensic analysis either with a forensic tool (e.g. Encase or Forensic Tool Kit) or experience with sandboxing.
Duration:
12-month contract positionWork location:
San Jose (1st week onsite for training/remote onward)
Duties:
Proactively identify and assess threats to users, network & data.Monitor and respond to reports of malicious activity.Respond to and investigate intrusions and security events.Demonstrate an understanding of client threat landscape including performing gap analyses & driving assessments.Perform thorough analysis of attacks and anomalous network behavior.Provide summarized and detailed analysis and documentation in support of ESEC.Perform proficient forensic analyses using security tools & processes.Identify Actionable Intelligence by processing Threat Intelligence (TI).Demonstrate ability to identify, contain, eradicate and recover from security incidents.Communicate with business units, partners and individuals to mitigate security threats.Advise the CISO and ESEC team on matters involving organizational, strategic, tactical & security best practices related to forensics & security incidents management.Attend meetings/represent ESEC as a senior lead for all security matters.Act as a lead/co-lead/backup on assigned ESEC projects while performing daily operational duties.Mentor junior staff colleagues.Create standard operating procedures and training documents.Other duties as assigned to meet ESEC needs and requirements.
Experience:
At least 5 years of enterprise information security & technical experience conducting security incident response.Exposure to forensic analysis using a forensic tool (e.g., Encase or Forensic Tool Kit) or experience with sandboxing.At least 5 years of cyber threat intelligence experience & making the information usable through the security incident process.Working experience applying IOCs to identify threats in the current environment & apply information to prevent future vulnerabilities in the infrastructure tech security.Working experience using best practices standards & frameworks: ISO 27001/27002; PCI DSS v4, GLBA; HIPAA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF; CIS RAM.CISSP and CCFP or equivalent certification desired (e.g., CCE, CHFI). Other highly desirable security certifications may be substituted for CISSP (e.g., CISA, CISM).
Tech. Stack Environment Experience:
Hardware: Network Switches, Routers, Load Balancers, Servers, Storage Systems, End-User Systems, Mobile Devices, or other devices that enable the organization to complete its mission.OS: UNIX, LINUX, WINDOWS.Network: LAN, WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ.Network protocols: TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, etc.DBs: Oracle, SQL, MySQL.Cloud Platforms: IAAS, PAAS, SAAS.Security concepts: Encryption, Hardening, etc.Security GRC.Forensic analysis tools.Active Directory.Programming languages a plus.Computer forensics experience a plus.Prior SIEM experience a plus.Malware analysis skills a plus.
#J-18808-Ljbffr
Duration:
12-month contract positionWork location:
San Jose (1st week onsite for training/remote onward)
Duties:
Proactively identify and assess threats to users, network & data.Monitor and respond to reports of malicious activity.Respond to and investigate intrusions and security events.Demonstrate an understanding of client threat landscape including performing gap analyses & driving assessments.Perform thorough analysis of attacks and anomalous network behavior.Provide summarized and detailed analysis and documentation in support of ESEC.Perform proficient forensic analyses using security tools & processes.Identify Actionable Intelligence by processing Threat Intelligence (TI).Demonstrate ability to identify, contain, eradicate and recover from security incidents.Communicate with business units, partners and individuals to mitigate security threats.Advise the CISO and ESEC team on matters involving organizational, strategic, tactical & security best practices related to forensics & security incidents management.Attend meetings/represent ESEC as a senior lead for all security matters.Act as a lead/co-lead/backup on assigned ESEC projects while performing daily operational duties.Mentor junior staff colleagues.Create standard operating procedures and training documents.Other duties as assigned to meet ESEC needs and requirements.
Experience:
At least 5 years of enterprise information security & technical experience conducting security incident response.Exposure to forensic analysis using a forensic tool (e.g., Encase or Forensic Tool Kit) or experience with sandboxing.At least 5 years of cyber threat intelligence experience & making the information usable through the security incident process.Working experience applying IOCs to identify threats in the current environment & apply information to prevent future vulnerabilities in the infrastructure tech security.Working experience using best practices standards & frameworks: ISO 27001/27002; PCI DSS v4, GLBA; HIPAA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF; CIS RAM.CISSP and CCFP or equivalent certification desired (e.g., CCE, CHFI). Other highly desirable security certifications may be substituted for CISSP (e.g., CISA, CISM).
Tech. Stack Environment Experience:
Hardware: Network Switches, Routers, Load Balancers, Servers, Storage Systems, End-User Systems, Mobile Devices, or other devices that enable the organization to complete its mission.OS: UNIX, LINUX, WINDOWS.Network: LAN, WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ.Network protocols: TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, etc.DBs: Oracle, SQL, MySQL.Cloud Platforms: IAAS, PAAS, SAAS.Security concepts: Encryption, Hardening, etc.Security GRC.Forensic analysis tools.Active Directory.Programming languages a plus.Computer forensics experience a plus.Prior SIEM experience a plus.Malware analysis skills a plus.
#J-18808-Ljbffr