Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

Sr. Incident Response Analyst-3Rd Shift

Expired Job

Suntrust Banks Atlanta , GA 30301

Posted 5 months ago

Job Description: :

Job Description

The Sr. Incident Response Analyst will investigate and respond to possible or confirmed cyber-attacks and data exfiltration attempts.

The Sr. Incident Response Analyst must have a passion for incident response and stay up to date with latest information security trends and emerging threats. This position will:

Respond to and eradicate malicious cyber-attacks towards SunTrust Bank.

  • Make contributions to the Incident Response program by constantly optimizing IR technology, processes, and procedures

  • Train and mentor SOC personal on analyzing alerts and proper operation security best practices.

Qualifications

Minimum Requirements:
Three or more years' working experience in a technology environment, two or more years must consist of a role directly related to cyber security.

Extensive working knowledge of common IT and security concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques, cyber incident response, malware analysis, computer forensics and the tools that support these processes. Ability to solve complex problems by applying best practices. Demonstrated proficiency utilizing security platforms related to logging, event correlation, incident management, vulnerability management and/or computer forensics.

Demonstrated teamwork and collaboration skills. Strong time management skills and ability to manage competing priorities effectively. Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization. Ability to obtain requisite technical certification(s) within six months of hire.

Preferred Requirements:
Exceptional critical thinking skills and be able to identify and respond to advanced attacks.

An understanding of proper incident response methods and operation security practices is critical for this position. Ability to be able to effectively communicate analysis findings to management as well as other team members. Associate's degree in Information Security, Information Technology, Computer Science or related field with at least one year work experience within this field; OR three or more years' working experience in a technology environment with a role specific to information security.

Working familiarity with various security applications and tools, such as SIEM, log analysis platforms, intrusion detection systems, packet analysis tools, vulnerability and penetration testing tools, digital forensic software or similar security technologies. Two or more of the following (or similar) certifications: Security+, GSEC, GCIA, GCIH, GCFA, GCED, GPEN, GWAPT, GREM, CEH, CISSP.

Equal Opportunity Employer: SunTrust supports a diverse workforce and is a Drug Testing and Equal Opportunity Employer. SunTrust does not discriminate against individuals on the basis of race, creed, color, gender, religion, national origin, age, disability, veteran status, pregnancy, marital status, citizenship status, sexual orientation, gender identity, genetic information, or any other classification protected by applicable laws.

To review the EEO Poster, copy and paste the following link into your browser: http://www1.eeoc.gov/employers/upload/eeoc_self_print_poster.pdf http://www.dol.gov/ofccp/regs/compliance/posters/pdf/OFCCP_EEO_Supplement_Final_JRF_QA_508c.pdf

Apply Now >> Refer a Friend

Link for schema



upload resume icon
See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Cyber Incident Response Senior Associate

Pwc

Posted 2 days ago

VIEW JOBS 1/15/2019 12:00:00 AM 2019-04-15T00:00 A career in our Incident and Crisis Management practice, within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. You'll play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.Our team helps organisations manage their controls over access to critical systems and assets during a crisis or an active cyber threat. As part of the team, you'll help us develop controls to stay ahead of a crisis, but also help us maintain security and information risk by responding and remediating any current or future cyber threats. Responsibilities As a Senior Associate, you'll work as part of a team of problem solvers with extensive consulting and industry experience, helping our clients solve their complex business issues from strategy to execution. Specific responsibilities include but are not limited to: * Proactively assist in the management of several clients, while reporting to Managers and above * Train and lead staff * Establish effective working relationships directly with clients * Contribute to the development of your own and team's technical acumen * Keep up to date with local and national business and economic issues * Be actively involved in business development activities to help identify and research opportunities on new/existing clients * Continue to develop internal relationships and your PwC brand Job Requirements and Preferences: Basic Qualifications: Minimum Degree Required: Bachelor Degree Required Fields of Study: Computer and Information Science, Computer Applications, Management Information Systems, Computer Engineering, Forensic Science Minimum Years of Experience: 3 year(s) Preferred Qualifications: Degree Preferred: Master Degree Certification(s) Preferred: in GIAC including GCFA, GCFE, GREM, GNFA, GCCC, and/or GCIA. Preferred Knowledge/Skills: Demonstrates thorough abilities and/or a proven record of success in the following areas: - Apply incident handling processes-including preparation, identification, containment, eradication, and recovery-to protect enterprise environments; - Analyze the structure of common attack techniques in order to evaluate an attacker's spread through a system and network, anticipating and thwarting further attacker activity; - Utilize tools and evidence to determine the kind of malware used in an attack, including rootkits, backdoors, and Trojan horses, choosing appropriate defenses and response tactics for each; - Use memory dumps and memory analysis tools to determine an attacker's activities on a machine, the malware installed, and other machines the attacker used as pivot points across the network; - Acquire infected machines and then detect the artifacts and impact of exploitation through process, file, memory, and log analysis; - Analyze a security architecture for deficiencies; - Recognize and understand common assembly-level patterns in malicious code, such as code injection, API hooking, and anti-analysis measures; - Derive Indicators of Compromise (IOCs) from malicious executables to strengthen incident response and threat intelligence efforts; - Conduct in-depth forensic analysis of Windows operating systems and media exploitation focusing on Windows 7, Windows 8/8.1, Windows 10, and Windows Server 2008/2012/2016; - Conduct in-depth forensic analysis of *Nix operating systems and media exploitation focusing on CentOS, RHEL, Solaris, AIX, HPUX, and Ubuntu/Debian; - Identify artifact and evidence locations to answer critical questions, including application execution, file access, data theft, external device usage, cloud services, anti-forensics, and detailed system usage; - Hunt and respond to advanced adversaries such as nation-state actors, organized crime, and hacktivists; - Extract files from network packet captures and proxy cache files, allowing follow-on malware analysis, or definitive data loss determinations; - Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation; - Detect and hunt unknown live, dormant, and custom malware in memory across multiple Windows systems in an enterprise environment; - Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections; - Target advanced adversary anti-forensics techniques like hidden and time-stomped malware, along with utility-ware used to move in the network and maintain an attacker's presence; - Use memory analysis, incident response, and threat hunting tools to detect hidden processes, malware, attacker command lines, rootkits, network connections, and more; - Track user and attacker activity second-by-second on the system via in-depth timeline and super-timeline analysis; and, - Identify lateral movement and pivots within client enterprises, showing how attackers transition from system to system without detection. Demonstrates thorough abilities and/or a proven record of success in the following areas: - Network Analysis, Memory Analysis, Endpoint Analysis, Cyber Incident Lifecycle, NIST 800-61; - Programming Languages such as Python, Perl, C/C++, C#, PowerShell, BASH, and Batch; - Demonstrable experience with at least two of the following tools including, X-Ways, Rekall, Volatility, EnCase, Remnux, IDA, Capture.Bat, RegShot, Radare, OllyDbg, Wireshark, Network Miner, NFdump, GREP, Tanium, CarbonBlack, CylancePROTECT, and PLASO/Log2Timeline. All qualified applicants will receive consideration for employment at PwC without regard to race; creed; color; religion; national origin; sex; age; disability; sexual orientation; gender identity or expression; genetic predisposition or carrier status; veteran, marital, or citizenship status; or any other status protected by law. PwC is proud to be an affirmative action and equal opportunity employer. Pwc Atlanta GA

Sr. Incident Response Analyst-3Rd Shift

Expired Job

Suntrust Banks