Connecting to LinkedIn...

Security Incident Analyst (windows/linux experience)

Job Title: Security Incident Analyst (windows/linux experience)
Contract Type: Contract
Location: Maidenhead, Berkshire
Industry:
Salary: Negotiable
Start Date: ASAP
Duration: 6 months
REF: SI-rs_1530892727
Contact Name: Racquel Smith
Contact Email: Racquel.Smith@projectpeople.com
Job Published: almost 6 years ago

Job Description

Day to Day Activities

  • Continuous monitoring of security tooling
  • Perform regular and ad-hoc Vulnerability Assessments.
  • Reporting on vulnerabilities to the PVG via the alerts system.
  • 'Spot checks' on logs on various systems.
  • Building understanding and documenting logging for systems.
  • Developing centralised logging, reporting and intelligence platforms
  • Collect external intelligence information from wide ranging sources, translated into applicable format and disseminated accordingly
  • 'Light touch' penetration testing with open source tooling (e.g. Metasploit)
  • Reporting on security events and effectiveness of tooling
  • Working with Internal Communications where needed to notify employees of new risks
  • Defining and setting a Cyber Threat Level to be communicated to staff
  • Continuous improvement to processes and procedures

Incident Related Activities

  • Incidents would be reviewed alongside Incident Management to determine if the issue affects confidentiality or integrity of company systems.
  • If the issue is defined as a Security Incident, the CERT resource would take command and:
  • Prioritise the incident according to a pre-defined security incident priority matrix.
  • Make an assessment as to whether external stakeholders, like external forensic investigators need to be involved.
  • Direct and co-ordinate all operations teams to contain and/or mitigate the issue.
  • Ensure that if data needs collection it is completed in a forensically sound manner.
  • Communicate with relevant stakeholders including Internal and Corporate Communications

Current Tooling

  • Lancope
  • Cisco ISE
  • Microsoft Security and Compliance Centre
  • QRADAR
  • Splunk
  • Arbor DDOS Protection
  • Akamai DDOS Protection
  • MS SCCM
  • McAfee ePO
  • Cisco ACS
  • Microsoft ATA
  • Microsoft Information Rights Management

Requirements

  • Experience performing security event and incident detection and handling in an operational environment such as SOC, CSIRT, CERT, etc.
  • Experience reviewing and analysing Security Events from various monitoring and logging sources
  • Knowledge of, and experience with packet analysis
  • Experience in web site and web application security assessment or penetration testing
  • Previous experience working as a part of an IT Security team or in Incident Response
  • An active knowledge of current trends in computer security, software/hardware vulnerabilities
  • An active interest in current security research
  • Ability to work as part of a CERT Team which may require rotational weekday/weekend on-call coverage
  • Ability to work independently and with minimal supervision
  • Ability to understand and implement technical vulnerability corrections
  • Experience of malware analysis
  • Scripting knowledge using BASH, Python, Perl, ruby
  • Knowledge of multiple operating systems including Windows, Linux, Solaris
  • Skills in Host and Network Forensics
  • Robust networking knowledge including TCP/IP, MPLS, OSPF, BGP

Project People is acting as an Employment Business in relation to this vacancy.