TalentRemedy
TalentRemedy is hiring: Sr. Information Security Analyst- Incident Response in W
TalentRemedy, Washington, D.C., US
As a member of the Information Security Incident Response team, the Sr. Information Security Analyst- Incident Response will coordinate the response activities for cyber security incidents across the corporate environment. You'll focus on reviewing, triaging, analyzing, remediating, and reporting on cyber security incidents. As the Sr. Information Security Analyst, you will manage validated cyber security incidents, in accordance with the Information Security Incident Response Plan and perform functions such as log analysis, conduct in-depth technical analysis of network traffic and endpoint systems, enrich data using multiple sources, and be responsible for rapid handling and mitigation of cyber security incidents. This is a full-time, exempt, remote position. You're perfect for this role, if you have the following: Knowledge of current cyber threats, adversary tactics, techniques, and procedures (TTPs), such as the MITRE ATT&CK framework, mitigation techniques, and evolving security technologies. Experience performing malware analysis. Experience conducting investigations in Cloud environments (Azure). Experience performing Threat Hunting to uncover malicious activity that evades existing security controls. Experience leveraging PowerShell, Python or BASH scripting for automation, alert enrichment or investigations. Exposure to other major areas of Information Security, such as Vulnerability Management and Remediation, Application Security, Identity and Access Management, GRC, Penetration Testing/Red Teaming. Experience with various databases and query languages. Experience leveraging information security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, DLP, data encryption, proxies, and network access control as it relates to responding to cyber incidents. Broad knowledge of information systems including Windows security, network security, systems development, communication networks, security software/hardware and operating systems. Experience working in a team environment, with experience teaching and learning from other team members. Experience communicating effectively with both technical and non-technical individuals. Conduct investigations and responds to internal and external Information security threats. Provide off-hour support as needed for security monitoring and response activities. Experience Needed: 2 years of incident analysis, security architecture, malware research, SOC, or any other similar incident response experience. 3 Years of overall IT Experience with a major emphasis on Information Security. Education: Bachelor's degree preferred. Security certifications - CISSP, CEH, GCIH, SSCP certifications preferred.