drjobs Cyber Security Analyst

Cyber Security Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Jersey City - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

RoleCyber Security Analyst

Location New Jersey Information Technology (IT)
Job Type Contract Hire Length: 6month

Client: UBS New York International


Do you have a knack for information security

Are you at your best when you need to analyze information security related incidents

Were looking for someone like that to:

Analyze malware samples to understands its behavior assess threat actor motivations and extract indicators of compromise (IOCs)

Act upon threat intelligence provided by Cyber Threat Intelligence function

Respond to Information Security related queries

Perform cyber threat hunting for the detection of advanced threats

Mentor and train junior analysts to enhance the overall technical skillset of the SOC establish analytic discipline and critical thinking and promote greater curiosity

thinking outside the box

Expand tune and enhance rulesets SIEM IDS etc.

to identify security incidents and reduce false positives

Investigate IOCs provided by Cyber Threat Intelligence or the Cyber Hunter function

Handling incidents encompassing multiple functions: detection and identification incident triage network and hostbased forensic analysis rootcause analysis containment system hardening etc.

We are involved in different type of information security incidents (phishing malware denial of service inappropriate usage and unauthorized access).

We are a young and empowered team who always drives for continuous improvement.

Your experience and skills You have:

A natural ability to solve complex issues through analytical and lateral thinking

Performed proactive hunting; have detected anomalous and potentially malicious activity in log data

Masters degree in a STEM field with 3 years of relevant experience;

Bachelors degree in a STEM field with 5 years of relevant experience; or 9 years of incident response malware analysis and threat detection

Handson experience with content development and usecase management

Proficiency in log parsing and data analysis (REGEX is a must)

Proficiency in x86 assembly language disassemblers and debuggers

Handson experience with Volatility or similar malware analysis/forensic tools

Proficiency in static and dynamic malware analysis

Demonstrable proficiency in code deobfuscation and antiforensic techniques

Fluency in at least one compiled language (C C etc. and one scripting language (Python Perl etc.

A firm understanding of the TCP/IP stack and networking (knowing the difference TCP and UDP is not enough)

Moderate to advanced understanding of DDoS attacks and mitigation techniques

Fluent in English

Security Certifications GNFA GCFE GPEN and GREM OSCP and OSCE must

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.