Hi,
Please find the requirement below , If you find yourself comfortable with the requirement please reply back with your updated resume and I will get back to you or I would really appreciate if you can give me a call back at my contact number 631-230-0251 x 5256
Please share the profile at vishal@edoorsinc.com
Position: Cyber Security Architect
Location: Austin, TX
Duration: 6+ Month/ Contract
Interview: Phone and In Person
Cyber Security Architect
Seeking an IT Security Architect with a minimum of 5 years of experience to work on the Cyber Security Rapid Response Team - Security Monitoring, Forensic and Threat Intelligence function. This position requires a strong information security professional, who is able to identify potential risks and develop achievable and effective strategies used to govern Rapid Response functions. The candidate will require security industry knowledge that evolves with current and emerging threats, as well as an ongoing understanding of key business and technological processes. This position will report to the Threat and Response Lead of Information Security.
Candidate will be responsible for implementing, monitoring and conducting forensic analysis on a multitude of security tools within heterogeneous environments in support of Security Monitoring, Forensics and Threat Intelligence discipline. The individual will perform security monitoring, investigations and perform analysis of events in order to thwart internal and external threats to the environment. Additionally, will collaborate on an ongoing basis with the Cyber Security Rapid Response Incident Response Team to support detection, triage, incident analysis, containment, remediation and reporting of events/incidents while coordinating, balancing business priorities, emerging and actual threats and best practices to ensure the confidentiality, integrity and availability of information assets.
Responsibilities:
Security Monitoring
Assist in establishing Global Security Monitoring discipline to support enterprise.
Conduct Security Monitoring activities to provide Security in Depth visibility into potential known and unknown threats that may pose risk to the environment.
Participate in security incidents and act as technical Subject Matter Expert during significant security incidents.
Review of alerts from Managed Security SOC providers, log correlation, log analysis, determining malicious software behavior, vetting out False Positives, remediating system misconfigurations, tracking system state changes, and other information across multiple systems. Finally, leveraging outputs to support forensic reconstruction as needed.
Utilize analytics to identify potential threats to the environment.
Detect, respond, mitigate, and report on cyber threats/incidents that may impact the environment.
Collaborate with technical leads: Engineering, Operations, Service Desk, Applications and BISOs on matters related to security monitoring across global footprint.
Collaborate and serve as liaison to Managed and/or Unmanaged Security Service providers.
Conduct Operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host based forensics as applicable.
Act as an internal information security consultant to the business and technology units, advising on risks, threats and control practices related to Rapid Response.
Develop and manage ongoing Cyber Security Training and Awareness to stakeholders.
Threat Intelligence
Operate Cyber Intelligence discipline that will provide a systematic, continuous process to identify, organize, analyze, understand and visually represent intelligence information about an adversary and their operational environment (physical, information, and cognitive dimensions) as a core component of Threat Intelligence program.
Analyze global and regional threat data and correlate to any existing intelligence. Actively monitor and research cyber threats with a direct or indirect impact to the corporate brand, business operations, technology infrastructure and client trust.
Actively engage in liaison activities with intelligence communities.
Engage in pro-active Intelligence collection, root cause analysis, reporting of threat intelligence from both internal and external sources.
Prepare reports that document security breaches and the extent of the damage caused by the breaches or security incidents. Provide expertise in identifying key cyber threat issues through a variety of intelligence resources available and proactively advise on remediation processes.
Advise management on tactical and strategic methodologies to proactively thwart Cyber Security incidents.
Produce weekly and monthly Cyber Intelligence Bulletins based on current posture. Produce technical and non-technical high-quality presentations, recommendations and findings for applicable stakeholders.
Collaborate with counterparts across the Intelligence Community.
Collaborate with all information assurance security professional's to identify IT security, physical & procedural shortfalls.
Forensics
Implement and conduct ongoing Forensic Services.
Establish repeatable process for Forensic support environment (i.e. Recovering deleted files, reconstructing internet history, using GREP search techniques, analyzing metadata, carving unallocated clusters, analyzing registry files, imaging files from servers and RAID arrays, and similar forensic techniques).
Knowledge of computer evidence and forensics application tools including: EnCase, FTK, NetAnalysis, NetWitness, Helix, Raptor, and others.
Expert knowledge of incident response processes (detection, triage, incident analysis, remediation and reporting).
Conduct digital investigations including: incident handling and response, network and computer forensics, malware and memory analysis.
Requirements:
Education - The candidate should have a BA or BS in one of the following fields of study: Computer Science, Information Security, Management Information Systems, or Computer Information Systems.
Individual should have a minimum of five years of experience in Cyber Security discipline and experience managing Technical Teams in a large scale environment.
Professional Certification – One or more of the itemized professional certifications is highly desirable for this position; CISSP, CRISC, GISP, GIAC, or equivalent.
Strong Information System Security background preferred.
Technologies/Trends:
Cyber Security, WAF, Cloud Security, Application Security, Network Security, Forensics, Threat Hunting
Industry Experience:
A Plus, Network Engineer, Application Development/Architecture, Malware Specialist, End Point Specialist, Forensic Analyst
Thanks & Regard,
Lead Recruiter | EDoors Inc. | Right every time !
200 Hawkins Ave #1512 Ronkonkoma, NY 11779
Fax : 631-389-2446 | URL : http://www.edoorsinc.com
Hangout : req.vishal/ vishalkumar.econo
Disclaimer:We respect your Online Privacy. This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. If you are not interested in receiving our e-mails then please reply with a "REMOVE" in the subject line at remove@edoorsinc.com and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience. If you wish to unsubscribe from future mail, click here.
You received this message because you are subscribed to the Google Groups "CVMSCRM" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cvmscrm+unsubscribe@googlegroups.com.
To post to this group, send email to cvmscrm@googlegroups.com.
Visit this group at https://groups.google.com/group/cvmscrm.
For more options, visit https://groups.google.com/d/optout.
No comments:
Post a Comment