Day to Day Activities - Continuous monitoring of security tooling
- Perform regular and ad-hoc Vulnerability Assessments.
- Reporting on vulnerabilities to the PVG via the alerts system.
- 'Spot checks' on logs on various systems.
- Building understanding and documenting logging for systems.
- Developing centralised logging, reporting and intelligence platforms
- Collect external intelligence information from wide ranging sources, translated into applicable format and disseminated accordingly
- 'Light touch' penetration testing with open source tooling (e.g. Metasploit)
- Reporting on security events and effectiveness of tooling
- Working with Internal Communications where needed to notify employees of new risks
- Defining and setting a Cyber Threat Level to be communicated to staff
- Continuous improvement to processes and procedures
Incident Related Activities - Incidents would be reviewed alongside Incident Management to determine if the issue affects confidentiality or integrity of company systems.
- If the issue is defined as a Security Incident, the CERT resource would take command and:
- Prioritise the incident according to a pre-defined security incident priority matrix.
- Make an assessment as to whether external stakeholders, like external forensic investigators need to be involved.
- Direct and co-ordinate all operations teams to contain and/or mitigate the issue.
- Ensure that if data needs collection it is completed in a forensically sound manner.
- Communicate with relevant stakeholders including Internal and Corporate Communications
Current Tooling - Lancope
- Cisco ISE
- Microsoft Security and Compliance Centre
- QRADAR
- Splunk
- Arbor DDOS Protection
- Akamai DDOS Protection
- MS SCCM
- McAfee ePO
- Cisco ACS
- Microsoft ATA
- Microsoft Information Rights Management
Requirements - Experience performing security event and incident detection and handling in an operational environment such as SOC, CSIRT, CERT, etc.
- Experience reviewing and analysing Security Events from various monitoring and logging sources
- Knowledge of, and experience with packet analysis
- Experience in web site and web application security assessment or penetration testing
- Previous experience working as a part of an IT Security team or in Incident Response
- An active knowledge of current trends in computer security, software/hardware vulnerabilities
- An active interest in current security research
- Ability to work as part of a CERT Team which may require rotational weekday/weekend on-call coverage
- Ability to work independently and with minimal supervision
- Ability to understand and implement technical vulnerability corrections
- Experience of malware analysis
- Scripting knowledge using BASH, Python, Perl, ruby
- Knowledge of multiple operating systems including Windows, Linux, Solaris
- Skills in Host and Network Forensics
- Robust networking knowledge including TCP/IP, MPLS, OSPF, BGP
|