Jr. Incident Response Analyst & Media Forensics Analyst - Military veterans preferred

2019-01-13
SAIC (www.saic.com)
Other

/yr

  full-time   employee


Santa Ana
California
92705
United States

Description

JOB DESCRIPTION: 
This position will be responsible for incident response for the 24/7 Security Operations Center (SOC). The candidate must have one year of professional experience in performing digital media forensic analysis, static malware code disassembly and analysis, and runtime malware code analysis. Additionally, they will have a minimum of one year of professional experience responding to information system security incidents and an ability to use the common industry security toolsets to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative authorities in a network security environment, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC). Job Specific Responsibilities: 
  • Develop moderately complex security designs and test plans using existing technology. 
  • Perform and document root cause analysis for security incidents. 
  • Perform and document all aspects of Digital Media Forensics Analysis using forensics tools (EnCase Forensic). 
  • Work closely with the SAIC CISO to identify and recommend process and system improvements to the security program. 
  • Create relevant documentation and recommendations for changes to the current security architecture. 
  • Drive the capabilities and execution to effectively optimize and improve enterprise security. 
  • Demonstrate expert level knowledge of security services and implementations. 
  • Investigate, positively identify, and document anomalous events and incidents that are escalated by Tier 1 engineers. 
  • Document and escalate appropriate events and incidents to Tier 3 engineer. 
  • Examine cyber adversary techniques in order to develop defensive methodologies. 
  • Conduct risk analysis and convert it into actionable monitoring recommendations to be conducted by the SOC. 
  • Recommend remediation and mitigation strategies and implementations based on the results of vulnerability assessments, to ensure effective achievement of the organizational objectives. 
  • Provide support for security incidents throughout the incident lifecycle as needed and make recommendations to ensure enterprise infrastructure is protected. 
  • Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards. 
  • Work with the SAIC CISO to develop a metrics program to report on overall SOC performance and effectiveness. 
VENDORS/TOOLS/MANAGEMENT SYSTEMS 
  • Wireshark 
  • LogRhythm 
  • ServiceNow 
  • Keylight 
  • Nessus 
  • Microsoft Exchange and Microsoft Exchange Online Protection 
  • Sourcefire 
  • Blue Coat 
  • Zscaler 
  • McAfee Data Loss Prevention 
  • EnCase Forensic 

Qualifications

TYPICAL EDUCATION AND EXPERIENCE: 
  • Bachelors and two (2) years or more experience; Masters and 0 years related experience.
CLEARANCE REQUIREMENT:
  • Must be able to pass a California Department of Justice (DoJ) LiveScan background investigation and a detailed lifestyle law enforcement background interview.
REQUIRED QUALIFICATIONS & EXPERIENCE 
  • Bachelor degree in Computer Science, Engineering, Information Technology, Cybersecurity or related field and a minimum of one year of experience in Cyber Security. 
  • Demonstrated Experience with Cyber Security E-mail and Incident Response including expert experience in at least two of the following areas: 
    • (a) Vulnerability Assessment; 
    • (b) Intrusion Prevention and Detection; 
    • (c) Access Control and Authorization; 
    • (d) Policy Enforcement; 
    • (e) Application Security;
    • (f) Protocol Analysis; 
    • (g) Firewall Management; 
    • (h) Incident Response; 
    • (i) Encryption; 
    • (j) Web‐filtering; 
    • (k) Advanced Threat Protection 
KEY REQUIREMENTS 
  • Security+ and/or CySA, plus CCNA Certification, 
  • Experience with Security Information and Event Management Tools (LogRhythm). 
  • Experience using digital media forensic tools (EnCase Forensic). 
  • Experience performing digital media forensic analysis, static malware code disassembly and analysis, and runtime malware code analysis. 
  • Experience writing moderately complex scripts. 
  • Understanding of networking concepts and technologies including TCP/IP, Routing, Switching, NAT, OSI Model, etc. 
  • Ability to manage multiple projects and multiple deadlines in an organized fashion. 
  • Understanding of advanced data analysis and management concepts. 
  • Technical writing abilities to author technical and management risk reports. 
  • Develop cyber security analytics and threat intelligence using multiple data sources provided to the Security Information and Event Management (SIEM) system. 
  • Work closely with the SAIC CISO to identify and recommend process and system improvements to the security program. 
  • Create relevant documentation and recommendations for changes to the current security architecture. 
  • Drive the capabilities and execution to effectively optimize and improve enterprise security. 
  • Demonstrate expert level knowledge of security services and implementations. 
  • Investigate, positively identify, and document anomalous events and incidents that are escalated by Tier 1 engineers. 
  • Document and escalate appropriate events and incidents to Tier 3 engineer. 
  • Examine cyber adversary techniques in order to develop defensive methodologies. 
  • Conduct risk analysis and convert it into actionable monitoring recommendations to be conducted by the SOC. 
  • Recommend remediation and mitigation strategies and implementations based on the results of vulnerability assessments, to ensure effective achievement of the organizational objectives. 
  • Provide support for security incidents throughout the incident lifecycle as needed and make recommendations to ensure enterprise infrastructure is protected. 
  • Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards. 
  • Work with the SAIC CISO to develop a metrics program to report on overall SOC performance and effectiveness. 
DESIRED QUALIFICATIONS & EXPERIENCE 
  • Certified Information Systems Security Professional (CISSP) 
  • Experience in Information Assurance Policy and Guidelines 
  • NIST Special Publication 800-53 
  • NIST Cybersecurity Framework 
  • ITIL® Foundation Level or higher Certification