Security Specialist - SOC analyst Tier2

BE  ‐ Onsite
This project has been archived and is not accepting more applications.
Browse open projects on our job board.

Description

Description:

Candidates in this role will be responsible for conducting incident response operations according to documented procedures and industry best practices. Candidates must have excellent communication skills. Must have extensive experience in multiple security areas such as SIEM, IDS, APT and WAF. Candidates will be required to participate in multiple intelligence communities and be able to disseminate pertinent information throughout the SED. Ideal candidates should have extensive experience in Linux and/or Windows operating systems as well as having a deep knowledge of networking and attack methods such as SQLi and pivoting. Must display enthusiasm and interest in information Security.
Requirements:

Standard Job Requirements:
Language English
Part of the SOC team that runs 24x7 with Level 1 analysts. This role (Level 2) has regular office hours from Monday to Friday (no shift work).
First point of escalation for the Level 1
Hunting for suspicious anomalous activity based on data alerts or data outputs from various toolsets
Review and build new operational processes and procedures
Provide first responder forensics analysis and investigation
Drives containment strategy during data loss or breach events
Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs)
Works directly with data asset owners and business response plan owners during low and medium severity incidents
Advice on the tuning of IDS, Proxy policy, in-line malware tools based on threat feeds, trust and rotation data, incidents or vulnerabilities and exploits of downstream systems.
Provide use case creation/tuning recommendations to administrators based on findings during investigations or threat information interviews
Lead response actions for incidents where CIRT is not required to intervene (low/medium priority)
Performing administrative tasks per management request (ad-hoc reports/training)

Functional and Technical competencies:
2+ year prior experience in a similar position
Passion and drive to work in start-up division with potential of significant growth in scope and services
Possess good logical and analytical skills to help in analysis of security events/incidents
Experience of network security zones, Firewall configurations, IDS policies
In depth knowledge TCP/IP
Knowledge of systems communications from OSI Layer 1 to 7
Experience with Systems Administration, Middleware and Application Administration
Experience with Network and Network Security tools administration
Knowledge of log formats and ability to aggregate and parse log data for syslog, HTTP logs, DB logs for investigation purposes
Ability to make create a containment strategy and execute
Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat)
Good knowledge of threat areas and common attack vectors (malware, phishing, APT, technology attack etc)

Start date
18/04/2016
Duration
9 months
From
eCRM Euro Ltd
Published at
21.03.2016
Project ID:
1095511
Contract type
Freelance
To apply to this project you must log in.
Register