Duration & type: 6 months contract with a major pharmaceutical industry client
Location: candidate can work remotely from any location in the us
Description: the soc is an advanced global team responsible for the detection and response to the most sophisticated cyber threats and attacksThe senior soc analyst will leverage a variety of tools and resources to proactively detect, investigate, and mitigate emerging and persistent threats impacting company’s networks, systems, and applications.
Forensics and incident response:
Serve as escalation point for conducting investigations into security incidents involving advanced and sophisticated threat actors and ttps Perform forensic collection and analysis of electronic assets, devices, and log sources Manage incident response activities including scoping, communication, reporting, and long term remediation planning
Identify, collect, and analyze threat intelligence from internal and external sources and teams Develop hypotheses, analyze techniques, and execute hunts to identify threats across the environment Interface with security teams and business stakeholders to implement countermeasures and improve defenses
Big data analysis and reporting:
Utilizing siem/big data to identify abnormal activity and extract meaningful insights. Research, develop, and enhance content within siem and other tools
Technologies and automation:
Interface with engineering teams to design, test, and implement playbooks, orchestration workflows and automations Research and test new technologies and platforms; develop recommendations and improvement plans
Day to day:
Perform host based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response Coordinate investigation, containment, and other response activities with business stakeholders and groups Provide mentoring of junior staff and serve as point of escalation for higher severity incidents Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement Recommend or develop new detection logic and tune existing sensors / security controls Work with security solutions owners to assess existing security solutions array ability to detect / mitigate the abovementioned ttps Creating custom siem queries and dashboards to support the monitoring and detection of advanced ttps against company network.
Education: bachelor’s degree in computer science or a related field relevant technical security certifications. Experience required: 6+ years of experience in incident response / computer forensics / soc team / threat hunting or related fields Host and network based forensic collection and analysis Dynamic malware analysis, reverse engineering, and/or scripting abilities Proficient with encase, responder, x-ways, volatility, ftk, axiom, splunk, wireshark, and other forensic tools Understanding of advanced persistent threat (apt) and associated tactics. Research, enrichment, and searching of indicators of compromise Very strong team and interpersonal skills along with the ability to work independently and achieve individual goals. Coordinate with other team members to achieve the specified objectives. Effective oral and written communication skills.