Senior Incident Response Analyst

  • Full-time

Company Description

Downtown Chicago with ability to work a blend of in the office and remote

Sign-on for Relocation 15k

Excellent comp, bonus, training oppty, certs and career growth with stable, profitable multi-billion company in great industry. 140-150k base plus 10.5% bonus

NO VISA SPONSORSHIP

Downtown Chicago with ability to work a blend of in the office and remote

Sign-on for Relocation 15k

Excellent comp, bonus, training oppty, certs and career growth with stable, profitable multi-billion company in great industry. 130-145k base plus 10.5% bonus depending level of experience.  Open to 3-5 year canidate 

NO VISA SPONSORSHIP

Job Description

·        Continue to develop companies incident response program

·        Utilizes and adheres to defined workflow and processes driving Incident Response and mitigation efforts

·        Provide root cause analysis, create metrics, management, dashboards, administration of monitoring tools, and communication process

·        Collects supporting information and/or relevant artifacts in support of Incident Response activities

·        Identify and execute on projects that improve our intrusion detection and incident response capabilities

·        Conducts technical analysis on impacted systems to determine impact, scope, and recovery from active and potential cyber incidents

·        Leverages Forensics tools, techniques, and capacities to support Cyber Incident Response activities

·        Documents results of cyber threat analysis and subsequent remediation and recovery in an effective and consistent manner

·        Executes the Incident Response lifecycle and coordinating remediation activities throughout the organization and its lines of business as a part of Cyber Incident Handling

·        Applies thought leadership to enhance and advance the defensive capabilities of the Threat Management Center and its subsequent ability to defend Company

·        Recommends solutions to optimize both technical and process/procedure aspects of the end to end incident lifecycle

·        Provides Training and Mentoring of Junior team members

 

What qualifications make you a fit for this role:

·        Previous experience with dynamic and/or malware analysis

·        Experience executing various Incident Response Frameworks and Handling Procedures

·        Program and Scripting Experience

·        Strong understanding of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems

·        Strong communication and presentation skills along with the ability to work in a highly collaborative environment

·        Exhibits initiative, follow-up and follow through with commitments

·        Strong relationship skills and collaborative style to enable success across multiple partners.

·        Manages multiple priorities in a high-pressure environment

·        Demonstrates effective organizational and technical skills

·        Experience with Enterprise Anti-Virus, IDS, Full Packet Capture and Host/Network Forensics Tools

·        Understanding of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture

·        Excellent verbal and written communication skills

·        Related Certification (A+, Network+, Security+, CISSP, GCIH, GCFA, GCFE, GNFA, GREM ) a plus

·        Ability to comply with any regulatory requirements

Qualifications

What qualifications make you a fit for this role:

·        Previous experience with dynamic and/or malware analysis

·        Experience executing various Incident Response Frameworks and Handling Procedures

·        Program and Scripting Experience

·        Strong understanding of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems

·        Strong communication and presentation skills along with the ability to work in a highly collaborative environment

·        Exhibits initiative, follow-up and follow through with commitments

·        Strong relationship skills and collaborative style to enable success across multiple partners.

·        Manages multiple priorities in a high-pressure environment

·        Demonstrates effective organizational and technical skills

·        Experience with Enterprise Anti-Virus, IDS, Full Packet Capture and Host/Network Forensics Tools

·        Understanding of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture

·        Excellent verbal and written communication skills

·        Related Certification (A+, Network+, Security+, CISSP, GCIH, GCFA, GCFE, GNFA, GREM ) a plus

·        Ability to comply with any regulatory requirements

 

Additional Information

Will not sponsor visas.  Prefer someone local to NYC, Philadelphia, New Jersey or CT.  Willing to relocate professionals who have experience as a Digital Forensics and Incident Response Manager.   Excellent compensation and bonus opportunity.