Tekfortune Inc
Technical Security Analyst
Tekfortune Inc, San Francisco, California, United States, 94199
Job Title: Technical Security Analyst
Location: California (Major cities) Oakland, San Francisco, Sacramento, Pleasanton, San Jose, Pasadena, San Diego CA
Duration: 12 Months
Key Responsibilities: Demonstrate ability to identify, contain, eradicate and recover from security incidents Proactively identify and assess threats to client's users, network and data Monitor and respond to reports of malicious activity Respond and investigate intrusions and security events Perform thorough analysis of attacks and anomalous network behavior Perform proficient forensic analysis using security tools and processes Identify Actionable Intelligence by processing Threat Intelligence (TI) Create Standard Operating Procedures and training documents
Basic Qualifications: 5+ Years' experience in information security and forensics and/or security incident response. CISSP and CCFP or equivalent certification desired (e.g., CCE, CHFI). Other highly desirable security certifications may be substituted for CISSP (e.g., CISA, CISM, etc.) Extensive knowledge of and proven experience with information technology systems and methods of developing, testing and moving solutions to implementation. Self-motivated self-starters/proactive, working closely and actively communicating with team members to accomplish time critical tasks and deliverables. Work collaboratively with other support team members and independently on assigned tasks and deliverables with minimum supervision.
Preferred Qualifications: Working experience of obtaining Cyber Threat Intelligence and making the information usable through the security incident process. Working experience of applying IOCs to identify threats in the current environment and apply information to prevent future vulnerabilities in infrastructure. Working experience using best practices standards and frameworks: ISO 27001/27002; PCI DSS v4, GLBA; HIPPA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF; CIS RAM. Experience with LAN WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ and network protocols like TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, etc. Experience with security concepts: Encryption, Hardening, Security GRC, Forensic Analysis Tools, Computer Forensic, SIEM, Malware analysis.
Key Responsibilities: Demonstrate ability to identify, contain, eradicate and recover from security incidents Proactively identify and assess threats to client's users, network and data Monitor and respond to reports of malicious activity Respond and investigate intrusions and security events Perform thorough analysis of attacks and anomalous network behavior Perform proficient forensic analysis using security tools and processes Identify Actionable Intelligence by processing Threat Intelligence (TI) Create Standard Operating Procedures and training documents
Basic Qualifications: 5+ Years' experience in information security and forensics and/or security incident response. CISSP and CCFP or equivalent certification desired (e.g., CCE, CHFI). Other highly desirable security certifications may be substituted for CISSP (e.g., CISA, CISM, etc.) Extensive knowledge of and proven experience with information technology systems and methods of developing, testing and moving solutions to implementation. Self-motivated self-starters/proactive, working closely and actively communicating with team members to accomplish time critical tasks and deliverables. Work collaboratively with other support team members and independently on assigned tasks and deliverables with minimum supervision.
Preferred Qualifications: Working experience of obtaining Cyber Threat Intelligence and making the information usable through the security incident process. Working experience of applying IOCs to identify threats in the current environment and apply information to prevent future vulnerabilities in infrastructure. Working experience using best practices standards and frameworks: ISO 27001/27002; PCI DSS v4, GLBA; HIPPA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF; CIS RAM. Experience with LAN WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ and network protocols like TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, etc. Experience with security concepts: Encryption, Hardening, Security GRC, Forensic Analysis Tools, Computer Forensic, SIEM, Malware analysis.