This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

News - New York, NY

posted 2 days ago

Full-time - Senior
New York, NY
Publishing Industries

About the position

As a Cyber Security, Principal Incident and Threat Response individual you will play a key role within our Cyber Defense team. This work includes effectively handling cyber security events and incidents, investigation and response to incidents, documentation and communication of relevant incidents to appropriate stakeholders, developing response plans, and conducting exercises to test response plans. Primary objectives for the role will be to minimize the impact of active security incidents through innovative approaches to incident response and to minimize the probability of security incidents through proactively improving our ability to prevent, detect, disrupt, investigate, respond to, and recover from those cyber risk events.

Responsibilities

  • Lead internal incident response engagements to understand, mitigate and remediate threats and risks impacting News Corp Business Units.
  • Perform complex incident response technical analysis and develop technical conclusions based on analysis of evidence; review analysis and conclusions of other team members.
  • Monitor for and investigate internal and external threats leveraging best of breed technologies.
  • Contribute to the Security Mission - correlating multiple data sources, analyzing the facts, determining best remediation strategy, and remediating until the incident is contained and resolved.
  • Set standards for the documentation of activities during an incident, creation of security incident reports, and for conducting post-incident reviews.
  • Drive continuous improvement through active collaboration with threat simulation, vulnerability management, and security architecture teams.
  • Spearhead the development of innovative approaches to detect, respond to, and eradicate advance threats; improve overall time to respond and eliminate threats; and increase effectiveness of analysts.
  • Mentor team members, junior and senior, in state-of-the-art incident response practices.
  • Communication (both written and verbal) of incidents to appropriate stakeholders; targeting discussions to appropriate technical depth dependent on the audience.

Requirements

  • Proven track record of working within the Security Incident Response space.
  • Broad range of Cloud Security expertise.
  • Familiar with tactics, techniques, and procedures commonly employed by threat actors, and their motivations.
  • Strong technical communication skills (oral and written) including experience briefing executive management.
  • Experience briefing senior-level leadership, and conveying technical subject matter to audiences of varying backgrounds and skill levels.
  • Full-stack knowledge to understand modern attacks that involve networks, infrastructure, compute and applications.
  • Familiarity with scripting/developing in modern languages like Python, Go, Ruby.
  • Understanding of modern application architectures (serverless, mobile, distributed).
  • Demonstrated experience in Cloud IR as a senior security support engineer or SOC Engineer / Analyst.
  • Public/Private Cloud Experience (AWS, Azure, Google Cloud, VMware).
  • In-Depth OS Experience (RHEL, Ubuntu, Windows Server).
  • Understanding of host based security and tooling.
  • Ability to identify network attacks and systemic security issues as they relate to threats and vulnerabilities.
  • Strong analytical skills/problem solving/conceptual thinking/attention to detail.
  • Ability to work effectively with peers and multiple levels of management.
  • Well organized, thorough, with the ability to balance and prioritize competing priorities.
  • Excellent verbal and written communication skills across multiple levels of the organization.
  • Highly self-motivated with the ability to identify areas of focus and tackle new challenges with or without direction.

Nice-to-haves

  • Multiple years of cyber security experience.
  • Preferably 5 years specializing in incident response and system monitoring and analysis.
  • Bachelor's degree in computer science, information assurance, MIS or related field, or equivalent work experience.
  • Knowledge of multiple computing platforms, including Network, Windows, OSX, Linux, Unix, networks and endpoints.
  • Expertise using Security Correlation and Analytics platforms / SIEM platforms.
  • Preferred certifications: GCFA, GCFE, CFCE, CDFE, CHFI or other forensic related certifications.

Benefits

  • Comprehensive and highly competitive benefits package, with a variety of physical health, retirement and savings, caregiving, emotional wellbeing, transportation, and other benefits.
  • Elective benefits employees may select to best fit the needs and personal situations of our diverse workforce.
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service