US Citizen
Green Card
EAD (OPT/CPT/GC/H4)
H1B Work Permit
Corp-Corp
W2-Permanent
Contract to Hire
Consulting/Contract
UG :- - Not Required
PG :- - Not Required
No of position :- ( 1 )
Post :- 13th Feb 2024
· Perform operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from SIEM monitoring tools, network and host-based intrusion detection systems, firewall logs, system logs (Unix & Windows).
· Responsible for responding to security incidents (malware infections, unauthorized access, malicious emails, DDoS attacks) and elevating to Threat Management team as needed.
· Analyze security event logs and alerts to determine validity, priority and impact against both security threat best practices and corporation policies.
· Evaluate the type, nature and severity of security events with a range of security event analysis tools.
· Conduct active and passive analysis of network traffic, operating systems, and host activity across all technologies and platforms, through security tools and sandbox environments.
· Perform incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.
· High understanding of processes related to threat correlation and mitigation.
· Experience leading as an Incident Response Coordinator
· Documenting security investigations through standard procedures:
o Recording full SOC Analyst response through remediation actions
o Completing a security AAR
o Completing a risk assessment as required
· Completion of security risk assessments
· Process assigned SOC queue tickets submitted by Crown Castle users and the IT Service Desk.
· Completion of weekly Social Media Report
· Additional Project Work as assigned.
Education/Certifications
· Bachelor's degree in IT or Computer Security or comparable years’ experience.
· Must have at least one of the following certifications: CISSP, CCE, PMP, GSEC, CCNA Cyber Ops, CISF-GIAC Information Security Fundamentals, CISM, CRISC, Security+, CEH and GISF
Experience/Minimum Requirements
· 5+ years of experience in IT Security monitoring
· Tier 3 incident response experience
· Experience in SIEM event auditing, log review and incident response
· Windows and Linux System administration preferred.
Other Skills/Abilities
· Demonstrates a profound sense of ethics, integrity, and confidentiality
· Finds common ground and viable solutions to complex problems in a compelling manner while maintaining a professional composure
· Influences across a diverse discipline in a collaborative, risk aware manner
· Organized, responsible and highly thorough problem solver
· Proven ability to create and build new processes
· Great verbal and written communication skills and attention to detail
· Self-starter who can work independently as well as in a team setting
· Works well with people from different areas of the business
· Ability to simplify complex technical topics
· Ability to learn, understand, and apply new technologies
· Ability to design and implement effective policies to achieve consistent team results.
· Demonstrates a "learning agility" to remain current in subject matter expertise
· Experience documenting enterprise security events
· Navigate ambiguity; Is adaptable to, and champions change
· Giving and receiving effective feedback across all interactions