Cyber Defense Analyst: Forensics and Attack Analysis
Posted on: February 14, 2019
- Intrusion monitoring, attack analysis, and incident response duties as required and directed. - Monitor open source feeds and reporting on the latest threats against computer network defenses. - Supports incident escalation and assesses probable damages, identifies damage control and remediation, and assists in developing courses of action. - Coordinate efforts of and provide timely updates to multiple teams during response - Assists with implementation of counter-measures or mitigating controls - May be called upon to assist with other Cybersecurity efforts such as firewall hardening and change control recommendations
Knowledge and Skills Required:
- Understanding of OSI model, network port, protocol and service expertise - Understanding of network security best practices - Experience with Windows and Linux Operating Systems and common applications - Understanding of normal operating system behavior. - Experience with the use of network analysis tools and network security devices (firewalls, proxies, etc.) - Understanding of core networking concepts (TCP/IP, etc.) and common protocols (HTTP, FTP, etc.) - Understaning of digital forensics, including one or more of the following a strong plus: - file system, registry, etc. artifacts commonly associated with malware or malicious activities. - Memory analysis - Malware reverse engineering - Familiarity with automation concepts and proficiency in scripting languages such as python, perl, ruby, javasscript, powershell, etc. - Strong analytical skills and critical thinking skills - Effective communication skills (both written and verbal) - Sound decision-making and judgment, especially under pressure. - Strong organization, prioritization, and rationalization skills.
Education and Experience Required: - Bachelor's Degree or higher in the field of Computer Science or Information Security or related field (may be substituted for experience and industry certifications) - 1-2 years of experience in cyber security or related technology field preferred - Individual technical Cyber Security Certification through one of the recognized bodies preferred: SANS, ISACA, (ICS)2, CompTIA, etc. Responsibilities:
- Identifies HP security system vulnerabilities, attacks, and threats, runs analyses on security incidents and threats, and researches appropriate countermeasures. - Uses knowledge of HP environment to scope the extent and impact of any vulnerability, attack or breach. - Resolves HP security issues related to security vulnerabilities, incidents and threats through independent analysis and/or research. - Develops, enhances and maintains HP-s security solutions based on HP security system analysis, research and incident resolution. - Operates as a key team member on security teams and advises on methods to improve security solutions. Education and Experience Required:
- Bachelor-s degree required, preferably in computer science, engineering or related area of study, or equivalent experience. - Technical Cyber Security Certification through one of the recognized bodies preferred: SANS, ISACA, (ICS)2, CompTIA, Cisco, CERT etc. - Typically 4+ years of relevant experience. Knowledge and Skills:
Keywords: HP, Austin , Cyber Defense Analyst: Forensics and Attack Analysis, Professions , Austin, Texas
Didn't find what you're looking for? Search again!