Summary
Join NBCUniversal's Cyber Defense Operations team as a Principal Incident Responder. This hands-on role involves leading forensic investigations, enhancing incident response capabilities, and working with stakeholders to handle cyber incidents. You will analyze threat data, contain and remediate incidents, perform malware analysis, and generate executive-level reports. The position requires strong communication skills and collaboration with various teams. You will also mentor junior team members and contribute to the development of internal processes. This is a fully remote position, with a preference for candidates able to commute to Orlando, FL or New York, NY.
Requirements
- Bachelor’s Degree/Master's Degree in an IT related field and/or equivalent work experience
- Minimum 10 years working in Cyber Defense with experience in Incident Response, Digital Forensics, Malware Analysis, Security Operations Center (SOC), Threat Hunting, Detection Engineering, or similar functions
- Previous experience supporting or leading incident response functions
- Experience using industry-standard security toolsets in a layered defense model
- Deep understanding of how to conduct Cyber Investigations on Windows, Mac, and Linux hosts, including on-prem and cloud-based environments
- Expert – level knowledge of malware analysis techniques, including static and dynamic analysis, reverse engineering, and debugging
- Excellent analytical, problem-solving, and critical thinking skills
- Strong verbal and written communication and interpersonal skills with the ability to explain technical concepts clearly and concisely
- Experience drafting incident or forensic reports for executive leadership
- Ability to work independently and as part of a team in a fast-paced environment
- Strong understanding of core Enterprise IT concepts (web application architectures, network environments, cloud environments etc.)
- Experience with host-based and network-based forensics tools and log collection analysis
- Knowledge of the cyber threat landscape to include different types of adversaries, campaigns, and the motivations that drive them
- Knowledge of industry recognized security and analysis frameworks (MITRE ATT&CK, Cyber Kill Chain, Diamond Model, NIST Incident Response, etc.)
- Ability to be on call and provide support during nontraditional working hours
- Fully Remote: This position has been designated as fully remote, meaning that the position is expected to contribute from a non-NBCUniversal worksite, most commonly an employee’s residence
Responsibilities
- Responsible for forensically leading incident response engagements as a technical resource, to deliver next steps on determining root cause analysis, containment actions, and remediation requirements
- Analyze threat data from multiple sources and identify security incidents and events of importance for direct escalation to Incident Commander(s)
- Function as Incident Handler to effectively and efficiently contain and remediate declared severity incidents ranging in size and complexity from unauthorized logins to ransomware, operating at the level of Team Lead
- Provide detailed timeline analysis across multiple log sources to showcase evidence-based conclusions on entry vectors, lateral movement, and campaign correlation
- Perform advanced malware analysis including static and dynamic analysis, reverse engineering, and identifying indicators of compromise (IOCs)
- Identify, articulate, and explain attack vectors, threat tactics, and attacker techniques to technical and non-technical stakeholders
- Generate executive-level incident and forensic reports, summarizing incident details including response actions, risk and business impacts
- Design, develop, and maintain Incident Response tools, scripts, and automation workflows to improve investigation efficiency and effectiveness
- Spearhead research and development activities to stay up to date with the latest forensic tools, techniques, and methodologies
- Contribute to the development of internal processes and support broader organizational initiatives, including Intelligence gathering and identifying detection opportunities
- Utilize analytical skillsets to pivot and correlate multiple log sources together in order to make conclusions on business risk and assessing impact for security incidents across multiple technology platforms (Cloud, Hosts, Networks, Applications, Email)
- Collaborate with internal teams, external partners, and vendors to resolve active Cyber Incidents
- Mentor Junior Incident Response and SOC Team Members
- Provide On-Call support for escalated events for 1 week on a 5-week rotation
- Drive delivery of Cyber initiatives and projects that influence incident response capabilities
Preferred Qualifications
- Hands on experience working with Incident Response and Threat Monitoring SOC functions
- Previous experience providing incident response support for Fortune 1000 companies
- Previous experience with various forensic technologies, including endpoint detection and response (EDR) tooling
- Incorporates the word “Peacock” into resume and/or job application
- Innovation driver - with the ability to design and script queries to achieve collection goals
- Previous experience working enterprise cyber security tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms
- Previous experience conducting static, dynamic, or reverse engineering malware analysis
- Experience in applying security concepts to Cloud computing (AWS, Azure, GCP)
- Relevant certifications (GCIA, GCIH, GCFA, GNFA, etc.)
- While this role is remote, it is highly preferred that the candidate is able to commute to our site in either Orlando, FL or New York, NY
Benefits
- This position is eligible for company sponsored benefits, including medical, dental and vision insurance, 401(k), paid leave, tuition reimbursement, and a variety of other discounts and perks
- Salary range: $160,000 - $175,000 (bonus and long-term incentive eligible)
Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.