The Sr. Security Analyst serves a critical function on the security team preparing for, responding to, and investigating cyber events.
Using diligence, flexibility, and creativity to respond to a range of threat types.
Triaging and remediating threats based on threat intelligence and active analysis of log data.
Participation in all phases of incident response through containment, eradication, and recovery.
Using host and network forensic techniques to investigate anomalies.
Verifying information through non-technical investigative techniques like interviews with persons of interest.
Performing root cause analysis and advising stakeholders on defense strategies.
Drafting documentation for team playbooks and advising on prevention practices.
Requirements
Bachelor’s or master’s degree in computer science, Information Security, or a related field is preferred.
Expert-level capability in investigating threats in both Windows and Linux hosts.
Deep understanding of the MITRE ATT&CK framework.
Demonstrated experience with log analysis, filesystem forensics, network forensics, and malware analysis.
Experience with a wide range of security tools including SIEM, secure email gateway, network and host-based IDS, WAF, network proxy, & endpoint protection.
Familiarity with the current information security threat landscape, patterns & best practices.
Prior experience working in a 24x7x365 operating environment.