Roth Staffing Companies - Los Angeles, CA

posted about 2 months ago

Full-time - Mid Level
Remote - Los Angeles, CA
Administrative and Support Services

About the position

The Cybersecurity Incident Response Analyst position is a hands-on role within the Information Security group, collaborating closely with the internal IT department. The primary focus of this role is to ensure a consistent and measurable approach to the triage and closure of security-related events. The successful candidate will be responsible for assessing, developing, and deploying detection capabilities to protect enterprise systems and data. This position is ideal for individuals who are passionate about Cyber Security, Threat Detection, Threat Hunting, and Incident Response. As a key member of the team, you will contribute to building and supporting a defensible environment that enables quick detection, containment, and response to threats, all while aligning with the business needs of a highly collaborative organization. The work environment is fast-paced and often at the forefront of technology, including the early adoption of various cloud services. This role presents unique challenges, particularly in integrating these services into the existing security practices. The Cybersecurity Incident Response Analyst will play a crucial role in ensuring that the organization can effectively respond to security incidents and maintain a robust security posture.

Responsibilities

  • Conduct day-to-day Incident Response activities as well as additional SOC related detection and response activities as required for a global environment.
  • Design, engineer, and implement runbooks and playbooks for Incident Response.
  • Coordinate with both technical and business stakeholders during the incident response process.
  • Perform host based, cloud based, network based, memory, or log analysis and/or forensics in support of Incident Response investigations.
  • Play an active role in CAA's Security Incident Response efforts, working to identify and mitigate information security threats.
  • Review security information, event logs, and reports, providing findings and recommendations.
  • Use input from IRM leadership and key security metrics to ensure technical security controls are meeting desired objectives; implement a process of continual review and improvement to ensure the measurable effectiveness of CAA's technical controls.
  • Other projects or duties as assigned.

Requirements

  • Minimum of 3 years in Information Technology, ideally with 2 years' experience in a hands-on Incident Response, Threat Hunting, or forensics role.
  • Bachelor's or master's degree in a relevant field of work.
  • Strong technical background with experience in at least two of the following: Windows disk and memory forensics, Network traffic analysis (netflow, pcap), Log Analysis, Unix or Linux disk and memory forensics, Malware analysis - both static and dynamic.
  • Strong understanding of the fundamental operations of servers, operating systems, networks, firewalls, cloud applications, and infrastructure.
  • Expertise building workflows and playbooks to facilitate the Incident Response process.
  • Strong understanding of the NIST framework and using a continuous improvement loop.
  • Experience building and managing incident response frameworks to test and validate the effective operation of security controls; measuring the ability to respond to threats and attacks at the earliest point in the kill chain.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service