Forensics and Incident Response CSM Requirements
- Experience with advanced computer exploitation methodologies
- Ability to synthesize data from multiple sources and present concise, relevant information to a non-technical audience
- Experience with FireEye products, highly desired
- Experience with a scripting language such as Perl, Python, or other scripting language in an incident handling environment, highly desired
- Experience in an analytical role of either network forensics analyst, threat analyst, incident response or security engineer/ consultant
- One or more of the following technical certifications: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), EnCE or equivalent certifications in these areas
- Experience developing and managing incident response programs
- Expertise in analysis of TCP/IP network communication protocols
- Experience conducting analysis of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operations
Forensics and Incident Response CSM Responsibilities
- Develop custom reports and other custom configurations / use cases for FireEye products within customer’s environment
- Help determine the extent of the compromise, attributes of any malware and possible data ex-filtrated
- Develop, document and manage containment strategy
- Maintain current knowledge of tools and best-practices in advanced persistent threats; tools, techniques, and procedures of attackers; and forensics and incident response
- Host/network based forensic investigations
- Develop custom reports based on data from multiple sources, including FireEye appliances, FireEye threat intelligence, network sensors, and outside intelligence feeds
- Present technical material in a clear, organized briefing to a mix of technical and non-technical personnel
- Identify opportunities to integrate FireEye appliances with other security products in customer’s network
Qualifications
- Excellent knowledge of current information security solutions and technologies, including network and host based products
- Experience implementing NIST information security guidelines in a diverse network environment
- Experience and knowledge of packet flow/TCP/UDP traffic, firewall technologies, proxy technologies, anti-virus, spam and spyware solutions (Gateway and SaaS)
- Malware/security experience
- Programming / scripting skills, highly desired
- Demonstrated ability to make decisions on remediation and countermeasures for challenging information security threats
- Excellent communication and presentation skills with the ability to present to a variety of external audiences, including being able to interact with senior executives
- Exceptional written communication
- Strong leadership skills with the ability to prioritize and execute in a methodical and disciplined manner
- Ability to set and manage expectations with senior stake-holders and team members
More jobs on https://www.qureos.com/
$ads={1}