Tuesday, May 7, 2019

Deployment/ Integration Enterprise Security (SOC Analyst) : NYC

Title: Deployment and Integration Enterprise Security (SOC Analyst) LEVEL 2/3
Location: NYC 
Type : Full time or CONTRACT
Pay : Range of 130-140K plus 20% Fixed bonus paid quarterly
Only US Citizens or GC holders
Interview type : Phone / Skype and Finally F2F meeting at NYC 

The Company Join one of the fastest growing companies in high-tech. The core of the CLIENT  platform is a signatureless, virtual machine-based security engine and a cloud-based threat intelligence network, which work seamlessly to help organizations protect their assets across all primary threat vectors, including Web, email, and file storage. 
Responsibilities:
 • Work with high profile customer accounts on product related consulting services
 • Provide deployment and configuration for  suite of products 
• Integrate and automate CLINET'S security solution with other security products in the customer’s network
 • Create SOC -Standard Operating Procedures around FireEye suite products including incident response, IOC sweeping, forensic analysis, disaster recovery, workflow and process diagrams.
 • Develop custom reports/dashboards and other custom configurations / use cases for CLIENT'S  suite of products within the customer’s environment 
• Support regional sales staff on in-depth technical consulting services 
• Walk customers through CLIENT’s suite of security response information with the capability to understand and locate the indicators of compromise 
• Help determine the extent of a compromise including attributes of any malware and identification of data that was possibly ex-filtrated 
 • Maintain current knowledge of tools and best-practices in advanced persistent threats; including tools, techniques, and procedures (TTPs) of attackers and for forensics and incident response Requirements: 
• 5+ years in a security consulting environment • 3 to 5 years’ experience in network security appliance deployment and architectures. 
• Must be willing to travel up to 70% • Should have SOC Consulting experience with the SIEM product line, highly desired 
• Experience with scripting languages such as PowerShell or Python. • Understanding of Network Protocols and security infrastructure (proxies, firewalls, email filtering technologies, and network intrusion detection systems) 
• Current knowledge of security threats, solutions, security tools and network technologies 
• Experience conducting analysis of electronic media, packet captures, log data, and network devices in support of intrusion analysis or enterprise-level information security operations 
• Excellent knowledge of security solutions and technologies, including: Linux based tools, network and endpoint solution architecture/implementation/configuration 
• System administration experience with enterprise email systems, highly desired • Experience and knowledge of packet flow/TCP/UDP traffic, firewall, SSCM, and other agent push and distribution technologies 
• Excellent communication and presentation skills, with the ability to present to a variety of internal and external audiences, including the ability to comfortably interact with senior executives 
• Able to build strong client relationships and be able to interact effectively at all levels of client organization • Ability to set and manage expectations with senior stake-holders and team members Desirable: 
• Experience with FireEye security products, highly desired • Incident response, malware analysis and investigation experience 
• Experience in an analytical role such as network forensics analyst, Threat Analyst or security engineer/ consultant -- 

SAM@NYTP.COM

No comments:

Post a Comment

Bloggers - Meet Millions of Bloggers