Perform incident response, with a primary focus of eliminating the threat to the network and determining the cause of the security incident while preserving evidence for further analysis
Ensure incidents are handed in a manner that is consistent with established playbooks
Monitors SIEM and logging for alerts of potential network threats, intrusions, and/or compromises
Responsible for understanding the global threat environment and general security best practices
Assists with triage of service requests from automated sensors and internal requests for assistance
Participates in active cyber hunting to identify and eliminate known and unknown network threats
Interface with technical personnel from various disciplines to rapidly resolve critical issues
Appropriately inform and advise the leadership of incidents and propose effective response and/or countermeasures for containment.
Participate in knowledge sharing with other security engineers and partners.
Identify, document, and recommend new or revised incident response playbooks
Drive continuous improvement of processes and procedures to improve analysis, detection, and mitigation of incidents in support of the overall Cyber Defense mission
Create and drive action plans to address recurring or ongoing information security incidents.
Develop and maintain reporting metrics used to measure team performance, ensure analyst adherence to processes/procedures for operational consistency, identify process improvements, coaching, training and professional development of the staff.
Participate in the planning and implementation of information security technology projects. Serve as point-person and subject matter expert for issues and projects related to Cyber Security Counter Threat Operations.
Collaboration as appropriate with leadership and other key stakeholders
Required:
Knowledge of industry-recognized analysis frameworks (Kill Chain, Diamond Model, MITRE ATT&CK, NIST Incident Response, etc.) and thorough understanding of fundamental security and network concepts
1-3 years' work experience as a security analyst or similar role with the ability to lead shift for the Security Operations Center
Ability to demonstrate triage and investigations utilizing multiple security sensors including documentation and debriefing of incidents.
Preferred:
Experience with network monitoring in a SOC environment
BS in Computer Science, Computer Engineering, Cyber Security, Forensics and/or equivalent work experience
Experience and knowledge conducting cyber threat analysis originating from phishing emails
Previous experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms
Development experience in one or more of the following: C+, Python, PS, Bash, or Java