View Our Website View All Jobs

Senior Incident Response Analyst


Tentative duration(contract to hire)

06/17/2017 to 06/17/2018

Senior Incident Response Analyst will provide technical support and take actions to prevent, detect, and remediate computer security incidents effecting the American Cancer Society Enterprise. This includes activities ranging from incident response, threat analysis, and specific use of SIEM, DLP, IDS/IPS as well as other analytical monitoring tools and threat detection technologies. Maintains relationships with internal and external customers, and vendors to ensure deployed solutions provide adequate security for the enterprise. Clearly understands business unit/department/company goals and demonstrates ability to translate them into specific performance goals.

Major functions:             


•Responsible for executing processes within all activities of the Security Incident Response Lifecycle. These functions include: Identify, Protect, Detect, Respond and Recover.<br>

•Coordinates response, triage and recovery activities for security events affecting the company’s information assets.<br>

•Leads efforts in the improvement and development of process/procedure manuals and documentation for incident response, threat intelligence, advanced persistent threat detection and vulnerability analysis.<br>

•Develop communication channels with technology owners and the business to evangelize the evolving threat landscape.<br>

•Must be able to present to different audiences and adjust accordingly (business, technical and management) either structured presentations or ad-hoc.<br>

•Provide reports and metrics related to security events (real time, trends), security incident management tracking and follow up<br>

•Must be able to establish and maintain business relationships with internal and external individual contributors as well as management.<br>

•Other duties as assigned

Technical/Functional skills:          


•Knowledge of HIPAA, PCI-DSS, ISO 2700X, the healthcare industry and proper application of the Security and Privacy Rules<br>

•Experience working in Vulnerability Analysis/Assessment<br>

•Experience working in a Security Operations Center (SOC) environment<br>

•Strong analysis and process evaluation skills.<br>

•Ability to maintain a high level of confidentiality.<br>

•Excellent problem solving skills.<br>

•Able to develop policies focused on governance and security enforcement that are in alignment with an overall GRC strategy.<br>

•Proven ability to lead and influence across and up during business impacting events <br>

•Excellent oral, written, and presentation communications skills.

Education/Experience/Licenses etc.:     


•Bachelor’s Degree in Computer Science, Information Systems or other related field. Or equivalent combination of education and work experience.<br>

•5-7 years of relevant experience in two or more of the following areas: incident response, malware analysis, threat analysis, network/host intrusion detection, security operations, with a minimum of 3 years’ experience focusing on Incident response. <br>

•Demonstrated experience with using and/or implementing SIEM technology and use cases.<br>

•Demonstrated experience in handling cyber incidents and response in similar critical environments (Malware Analysis, Email Threat Analysis, Web Threat Analysis, etc.)<br>

•Strong knowledge of enterprise detection technologies and processes (Advanced Threat Detection Tools, IDS/IPS, Network Packet Analysis, Endpoint Protection)<br>

•Advanced knowledge of network protocols and operating systems (Windows, Unix, Linux, Databases)<br>

•CISSP, CEH certification a plus. Other security or GRC focused certifications welcomed.<br>

•Working knowledge of application development, server, and/or networking architecture components preferred.

Read More

Apply for this position

Apply with Indeed
Attach resume as .pdf, .doc, .docx, .odt, or .rtf (limit 5MB) or Paste resume

Paste your resume here or Attach resume file