This site uses cookies. To find out more, see our Cookies Policy

Sr. Incident Response Analyst & Media Forensics Analyst in Santa Ana, CA at Volt

Date Posted: 1/14/2019

Job Snapshot

Job Description

Volt seeks a Sr. Cyber Security Analyst to be focused in Incident Response and Digital Media Forensics, with our major client located in Santa Ana, CA.

This position will be responsible for incident response for the 24/7 Security Operations Center (SOC). The candidate must have one year of professional experience in performing digital media forensic analysis, static malware code disassembly and analysis, and runtime malware code analysis. Additionally, they will have a minimum of one year of professional experience responding to information system security incidents and an ability to use the common industry security toolsets to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative authorities in a network security environment, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC).

JOB SPECIFIC RESPONSIBILITIES:

  • Develop moderately complex security designs and test plans using existing technology.
  • Perform and document root cause analysis for security incidents.
  • Perform and document all aspects of Digital Media Forensics Analysis using forensics tools (EnCase Forensic).
  • Work closely with the CISO to identify and recommend process and system improvements to the security program.
  • Create relevant documentation and recommendations for changes to the current security architecture.
  • Drive the capabilities and execution to effectively optimize and improve enterprise security.
  • Demonstrate expert level knowledge of security services and implementations.
  • Investigate, positively identify, and document anomalous events and incidents that are escalated by Tier 1 engineers.
  • Document and escalate appropriate events and incidents to Tier 3 engineer.
  • Examine cyber adversary techniques in order to develop defensive methodologies.
  • Conduct risk analysis and convert it into actionable monitoring recommendations to be conducted by the SOC.
  • Recommend remediation and mitigation strategies and implementations based on the results of vulnerability assessments, to ensure effective achievement of the organizational objectives.
  • Provide support for security incidents throughout the incident lifecycle as needed and make recommendations to ensure enterprise infrastructure is protected.
  • Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards.
  • Work with CISO to develop a metrics program to report on overall SOC performance and effectiveness.

VENDORS/TOOLS/MANAGEMENT SYTEMS

  • Wireshark
  • LogRhythm
  • ServiceNow
  • Keylight
  • Nessus
  • Microsoft Exchange and Microsoft Exchange Online Protection
  • Sourcefire
  • Blue Coat
  • Zscaler
  • McAfee Data Loss Prevention
  • EnCase Forensic

REQUIRED QUALIFICATIONS & EXPERIENCE

  • Bachelor degree in Computer Science, Engineering, Information Technology, Cybersecurity or related field and a minimum of one year of experience in Cyber Security.
  • Must be able to meet all Law & Justice and departmental clearance requirements prior to starting work and be eligible to pass law enforcement level background investigations and obtain U.S. SECRET (or similar) clearances as required.
  • Demonstrated Experience with Cyber Security E-mail and Incident Response including expert experience in at least two of the following areas:
    1. Vulnerability Assessment;
    2. Intrusion Prevention and Detection;
    3. Access Control and Authorization;
    4. Policy Enforcement;
    5. Application Security;
    6. Protocol Analysis;
    7. Firewall Management;
    8. Incident Response;
    9. Encryption;
    10. Web?filtering;
    11. Advanced Threat Protection

KEY REQUIREMENTS

  • Security+ and/or CySA,
  • Experience with Security Information and Event Management Tools (LogRhythm).
  • Experience using digital media forensic tools (EnCase Forensic).
  • Experience performing digital media forensic analysis, static malware code disassembly and analysis, and runtime malware code analysis.
  • Experience writing moderately complex scripts.
  • Understanding of networking concepts and technologies including TCP/IP, Routing, Switching, NAT, OSI Model, etc.
  • Ability to manage multiple projects and multiple deadlines in an organized fashion.
  • Understanding of advanced data analysis and management concepts.
  • Technical writing abilities to author technical and management risk reports.
  • Develop cyber security analytics and threat intelligence using multiple data sources provided to the Security Information and Event Management (SIEM) system.
  • Work closely with the CISO to identify and recommend process and system improvements to the security program.
  • Create relevant documentation and recommendations for changes to the current security architecture.
  • Drive the capabilities and execution to effectively optimize and improve enterprise security.
  • Demonstrate expert level knowledge of security services and implementations.
  • Investigate, positively identify, and document anomalous events and incidents that are escalated by Tier 1 engineers.
  • Document and escalate appropriate events and incidents to Tier 3 engineer.
  • Examine cyber adversary techniques in order to develop defensive methodologies.
  • Conduct risk analysis and convert it into actionable monitoring recommendations to be conducted by the SOC.
  • Recommend remediation and mitigation strategies and implementations based on the results of vulnerability assessments, to ensure effective achievement of the organizational objectives.
  • Provide support for security incidents throughout the incident lifecycle as needed and make recommendations to ensure enterprise infrastructure is protected.
  • Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards.
  • Work with the CISO to develop a metrics program to report on overall SOC performance and effectiveness.

DESIRED QUALIFICATIONS & EXPERIENCE

  • Certified Information Systems Security Professional (CISSP)
  • Experience in Information Assurance Policy and Guidelines
  • NIST Special Publication 800-53
  • NIST Cybersecurity Framework
  • ITIL® Foundation Level or higher Certification

This is a contingent/temporary position offered through Volt Workforce Solutions. Volt offers competitive compensation, the chance to work with some of the world’s leading companies, and a staff committed to helping you take the next step on your career path.

To learn more about Volt, please visit: http://www.volt.com and to see more of our job postings, please visit: http://jobs.volt.com

Volt is an Equal Opportunity Employer.