Title - Information Security - Weehawken, NJ Skills : Security, Operations, Mcafee, Malware, SIEM Rate - 50/hr Job Description: SOC monitoring technology includes the following: Perform end to end analysis and investigation of suspicious emails reported by users. Co-ordinate with vendors and support groups for managing email content filtering End to end investigation of FireEye/Source fire/McAfee (HX,EX,NX) detected alerts using the FireEye CMS, LAB PC and other online tools. Coordinate with various teams and support groups for malware containment and remediation. Perform coordination with various product vendors during the security incident life cycle. Perform URL filtering and reviews as per customer requirement or as part of incident handling. Investigation of malware related issues reported by users with help of BUP files Static and Dynamic Malware Analysis. Perform security log search as per customer requirement. Handling user queries via chat channel /calls/emails. Review and update the security monitoring rules in order to minimize false positives. Maintain and update all relevant documentation (knowledge articles, tickets, etc Respond to Information Security related queries. Provide detailed report write-up on security incidents to technical and non- Qualifications: Bachelor s / diploma in Computer Science/ Electronics GCIA (GIAC Certified Intrusion Analyst) is an advantage. Experience: Any Graduate having passion to work in Security Operations. Having below is an advance : Hands on Experience on Security Tools like ArcSight, Nessus, Nmap, Snort/Sourcefire, FireEye, Wireshark/Ethereal etc. Hands on experience in detection and analyzing Malware intrusion alerts from FireEye, Sourcefire etc. Static and Dynamic Malware Analysis. Strong understanding on Windows, Unix and Networks concepts. Experience with SIEM platforms. Experience in log correlation and analysis. Knowledge of cyber threats (phishing, malware, etc and vulnerabilities Knowledge of Information Security best practices. Ability to think critically and properly assess security events. Scripting experience (Python Knowledge of incident and problem management frameworks (eg ITIL GCIA (GIAC Certified Intrusion Analyst) is an advantage. Essential Skills / Aptitude: MS office. Good English Communication skills. Customer handling skills, Phone skills. Team player. Flexible to shift working hours.
Associated topics: cybersecurity, forensic, identity access management, iam, information security, information technology security, leak, malicious, phish, security engineer