Search by job, company or skills

Happiest Minds Technologies

ASSOCIATE ARCHITECT - Information Security Consulting

Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 6 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Position Title: Incident Response Analyst

Schedule:  6am to 6pm CST (40 hours per week within this daily time range) + On-call rotation approx. every 6 weeks

Required Experience: 8 to 11 Years

Duration: Full-Time

Required skills:

  • Extensive experience with all phases of incident response. 5+ experience performing complex incident investigations including triage, containment, eradication, evidence collection, after-action reporting, and documentation.
  • 5+ years+ experience performing in-depth analysis of security logs and telemetry from a diverse range of sources, including endpoint, network, cloud, and e-commerce systems to identify and contain Security Incidents.
  • Strong experience & skills performing incident triage and investigating attacks, malware, and suspicious activity at a process, command, and code-level.
  • Mastery of Network (TCP/IP), Linux, or Windows OS server infrastructure
  • Technology experience 10+ years, 6+ years of information security
  • Excellent English communication skills (written, verbal, and comprehension)
  • Ability to work in an on-call rotation that covers a one week time period after normal business hours and on weekends. This requires after hours work and being logged in and online within 15 min for emergency page outs.
  • Confident, energetic, driver, leader mentality
  • Extremely detail-oriented
  • Passionate about information security
  • Good Judgement
  • Proactivity
  • Advanced problem solver

Experience

  • Cybersecurity expertise in incident response, monitoring and responding to security events and incidents using established processes, creating processes and procedures where none are already established.
  • Experience with artifact identification outside of cybersecurity tools such as log analysis, malware detonation, and endpoint memory analysis.
  • Mastery of one or more of the following: SIEM, Firewalls, IDS/IPS, EDR, Proxy, AV, DLP, EuBA, Malware sandboxing and reverse engineering, or Cloud Security.
  • Familiarity with common and emerging cyber-attack techniques, TTPs, and IOCs.
  • Working in a SOC or providing incident support for a security team
  • Leading multi-team incident investigations (must be comfortable in a facilitation role)
  • Experience identifying and mitigating web application attacks, C2 beaconing, and/or DPL/Data Exfil.
  • Log/protocol analysis, writing RegEx, and experience efficiently analyzing and sifting through thousands of logs to quickly pinpoint/identify suspicious activity.
  • Experience with searches in a SIEM (like QRadar or Splunk) and/or an EDR (like Carbon Black, CrowdStrike Falcon).
  • Threat hunting in core security tools

Tool Experience

  • SIEM (QRadar, Splunk, Google SecOps, etc.)
  • Google SecOps, DataDog and/or CrowdStrike Raptor query languages
  • Packet/Protocol Analyzers (Wireshark, Fiddler, NetWitness Investigator, NetFlow Analyzer, etc.)
  • Memory Analysis Tools (Memoryze, FTK Imager, DumpIt, WinPmem, etc.)
  • Regex

More Info

Job Type:
Industry:
Function:
Employment Type:

Job ID: 146838819

Similar Jobs