Listing Description
The Incident Response Analyst deals with advanced, complex, and ever-changing threats which could affect the Syniverse brand and/or business operations. Demonstrates strong self-managed and lead individual while contributing to cross team guidance while delivering against enterprise level cyber security programs. Drive delivery for the implementation, monitoring, and continuous improvement of Security Operations Centers (SOCs) and Cyber Fusion Center, Vulnerability Management, Incident Handling & Response, and Data Protection practices
Additional Information
Duties and Responsibilities:
Manages Cyber Security and Data Protection Efforts
- Lead Individual and/or cross-functional team activities, providing leadership, guidance and consultation to the team, as needed to address issues.
- Develop project plan(s) and resource requirements
- Supports and enforces a team model to ensure the Syniverse brand and/or business operations.
- Operates a follow the sun model for SOCs.
- Manages problem root cause identification, solution identification and design, and process improvements.
- Reduces the threat landscape by improving the vulnerability management program.
- Continuously enhance Incident Response capabilities.
Identify Needs, Develop, and Maintain Critical Security information
- Enhance threat intelligence leveraging technology and information available from both internal and external sources.
- Cultivate team knowledge and skill sets to develop and respond to cyber threats
- Establish the ability to monitor and safeguard data in real time
- Ensure and maintain good relationships exist within Syniverse.
Resolve Security Issues
- SOCs are capable of receiving events from monitored systems and routing to
- dedicated personnel for review.
- Contribute to the success of forensics capabilities.
- Extend proactive monitoring of enterprise network and systems.
- Address identified and confirmed security events in a timely manner and provide recommendations
- Proactively ‘hunt’ for potential threat actors on the network and provide recommendations
- Work with other groups to ensure continuity and coverage of the enterprise.
Job Requirements:
The qualifications we are looking for are considered a mix of work experience and education.
Minimum Qualifications:
- BS in Computer Science, Information Systems, related field or equivalent work experience
- 3-5 years experience as a Securiy Incident Responder
- Technology experience with the following: Proxies, Linux, Splunk, Red Hat, MS Windows OS, Microsoft ATP space depender,AWS, security monitoring experience
- Proficient with CrowdStrike and other EDR tools.
- Advanced understanding of Cyber Security and Data Protection
- Advanced level of troubleshooting skills
- Advanced Knowledge of Security Policies/Practice
- Advanced knowledge in SOC operations, Incident Handling & Response ad Data Protection practices
- Advanced level of awareness of current attack vectors and TTPs
- Technology experience with the following: vulnerability management tools, SIEM, advanced cyber security tools, Firewall and router configuration, switches, secure network architecture, VPNs, PKI, Portals, Cisco, network monitoring technologies, Solaris, AIX , HP-UX, Checkpoint, IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Radius, F5, Nessus, security tools and facilities.
Listing Details
- Salary: $130000 - $160000
- Citizenship: Us Citizen
- Incentives: Bonus
- Education: Bachelors Degree
- Travel: No Travel
- Telework: Full Telecommute