Remote Incident Response Analyst

Logo of HR Professional Consulting

HR Professional Consulting

πŸ’΅ $80k-$120k
πŸ“Remote - United States

Job highlights

Summary

Join our team as an Incident Response Analyst and contribute to ensuring internal security through best practices like threat recognition and process setup. You will work with various teams to set up high-quality processes and ensure internal security.

Requirements

  • Bachelor’s degree or equivalent qualification
  • 4 or more years of relevant cybersecurity operations, security system operations management, and/or experience in roles described in this section
  • Network performance management such as troubleshooting slow server response times and network routing issues
  • Web Application Firewall (WAF) administration including custom signature authoring, managing governance of signature deployment, patching, etc., signature efficacy evaluation/tuning, authoring of policy testing regimen
  • Web application developer/administration including troubleshooting of web server engines (e.g. connection monitoring, resource utilization, slow response, etc.), web application stacks (e.g. connections from an application to a database server, authentication flows, etc.), elements supporting web applications such as containers, operating systems, micro-service hosting platforms, and impacts of application errors related to data validation or malformed API calls
  • TCP/IP network administration / optimization / troubleshooting
  • Incident response experience for inbound application attacks with experience working in a structured, formal β€œSecurity Operations Center” (SOC) environment and proficiency in identifying internet sources and distinguishing suspicious from benign

Responsibilities

  • Follow best practices like threat recognition, pattern analysis, and surveillance detection to set up high-quality and highly efficient processes to ensure internal security
  • Work directly with all Line of Business App Teams, Subject matter experts, Production Management Teams, Product Owners, Senior Technology Management, and Risk and Control functions
  • Investigate anomalous network traffic pattern events
  • Develop and maintain DoS and web application firewall policies to protect the Firm, exercising a disciplined approach that minimizes operational risk and maximizes security posture
  • Identify, document, and mitigate risk and exposure to emerging threats identified by peer organizations
  • Test and validate policy rules/signatures for effectiveness, applicability, etc
  • Profile current and new applications and map to appropriate perimeter security policy
  • Deliver Incident Response Support for DoS, DDoS, and related application attacks
  • Provide activity and progress reporting to Cyber Operations management

Preferred Qualifications

  • SIEM including complex search compilation in tools such as Splunk
  • Application development such as text manipulation/handling via scripting in Python or Java and regular expressions, creating proof of concepts to exploit zero day vulnerabilities
  • Previous 24 X 7 operations experience
  • 1 or more years of cybersecurity operations related experience, including threat and risk assessment documentation

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.
Please let HR Professional Consulting know you found this job on JobsCollider. Thanks! πŸ™