search
Home > San Antonio jobs > San Antonio computer/technical

Posted: Friday, September 1, 2017 6:00 PM

Manage operations in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions. Ensure events are properly identified, analyzed, and escalated to incidents.Lead hunt activities for anomalous activity and indicators of compromise using various intelligence feeds and toolsets.Serve as the technical escalation point and mentor for lower:level analysts.Participate in the response, investigation, and resolution of security incidents.Provide communication throughout an incident per the ISOC Standard Operating municate directly with end users and asset owners.Maintain a strong awareness of the current threat landscape.Create knowledge base articles for handling medium and high severity incidents.Assist in the advancement of security policies, procedures, and automation.Create custom network based signatures to improve defensive posture within NIDS and SIEM.Utilize malware analysis techniques (advanced and static analysis) to identify and assess malicious software. Perform computer and network forensic analysis.Develop incident response reporting and policy updates as needed.Day to day responsibilities:Manage analysts within operations to ensure events and incidents are responded to per standard operating procedures.Serve as escalation point for events and incidents.Documents and conforms to processes related to security monitoring.Provide performance metrics as necessary.Provide training, mentorship and career growth planning and guidance to analysts. QualificationsBackground and experience:Advanced knowledge and understanding of network protocols and devices.Highly proficient in intrusion analysis and incident response.Advanced experience with Mac OS, Windows, and Unix systems.Demonstrable problem solving, analytical skills and attention to detail.Strong verbal and written communication skills.Ability to handle high:pressure situations in a productive and professional manner.Document and conform to processes related to security monitoring.Provide incident investigation, handling, and response to include incident termediate experience with evidence seizure, computer forensic analysis, and data recovery.Strong time management, skills with the ability to multitask.Ability to work a flexible work schedule, including weekends.Understanding and/or experience with one or more of the following programming languages: .NET, PHP, Perl, Python, Java, Ruby, C, C++.General knowledge and experience and expertise with ethical hacking, firewall and intrusion detection/prevention technologies, secure coding practices, and threat modeling.Advanced knowledge of the following:SIEMPacket AnalysisSSL DecryptionMalware DetectionHIDS/NIDSNetwork Monitoring ToolsCase Management SystemKnowledge BaseWeb Security GatewayEmail SecurityData Loss PreventionAnti:VirusNetwork Access ControlEncryptionVulnerability IdentificationRequired experience and education:BachelorA?s degree in Computer Science or equivalent combination of education and experience required.3+ years of experience in a security operations center (SOC) environment required.GCIA, GCIH required. GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MSA, MCP, or MCSE preferred.Experience with SIEM (i.e. Arcsight, QRadar) Sourcefire, FireEye, Snort or an equivalent tool required.3+ years of experience with reviewing raw log files, data correlation, and analysis (ie. System logs, netflow, firewall, IDS) required.Experience creating Snort signatures required. LI:563730_AM3*TECHIND

Source: https://www.tiptopjob.com/jobs/71569724_job.asp?source=backpage


• Location: San Antonio

• Post ID: 30888572 sanantonio
sanantonio.backpage.com is an interactive computer service that enables access by multiple users and should not be treated as the publisher or speaker of any information provided by another information content provider. © 2017 backpage.com