Incident Response Analyst/SOC Analyst
Mckinsey & Company
Contract Waltham, Massachusetts, United States Posted 3 years ago
About Position
Incident Response Analyst/SOC Analyst (Contract)
$86.00 / Hourly
Waltham, Massachusetts, United States
Incident Response Analyst/SOC Analyst
Contract Waltham, Massachusetts, United States Posted 3 years ago
Skills
· Bachelor's degree; Master's degree preferred in (IT/Computer Science or Service-Management is preferred) military experience and/or equivalent experience · 5+ years of information security and/or cyber security experience · 3-5 years of experience in security monitoring and/or incident response · Experience in two or more of the following security domains: digital forensics (computer memory network cloud virtualization) malware analysis (Dynamic and static) reverse engineering pen testing network investigations threat hunting threat intelligence security engineering OSINT · Awareness about security products and technologies and/or networking protocols. (Splunk Arcsight Qradar etc.) · Understanding of security alerts that includes malware/phishing denial of service unauthorized access ETC knowledge of security tools that include SIEM IDS/IPS log aggregation malware sandboxing threat hunting etc. · Security certifications like GIAC certifications or equivalent work experience will be preferred · Strong process management background with a keen interest in process development · Expertise to manage SOPs process adherence by teams & an eye for continuous improvement · Excellent interpersonal and collaborative skills · Strong written and verbal communication skills with the ability to communicate security and risk-related concepts to both technical and non-technical audiences · Ability to multi-task prioritize coordinate and work well under pressure to meet deadlines · Due to the nature of the engagement Green Card or US Citizenship is requiredDescription
The most important thing is the candidates “mindset” – he and the team can teach their specific technologies and processes, but they cannot teach mindset
Problem solver – need to be able to monitor, detect, and then respond in the appropriate way
Good communication
Open to learning
- 5+ years of information security and/or cyber security experience
- 3-5 years of experience in security monitoring and/or incident response
- Experience in two or more of the following security domains:
digital forensics (computer, memory, network, cloud, virtualization)
malware analysis (Dynamic and static)
o reverse engineering
pen testing
network investigations
threat hunting
threat intelligence
security engineering
OSINT
- Awareness about security products and technologies, and/or networking protocol – they use Splunk but that is not a requirement/he is not hung up on specific tools.
By applying to a job using PingJob.com you are agreeing to comply with and be subject to the PingJob.com Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.