Previous Job
Previous
Cyber Security Analyst
Ref No.: 18-00597
Location: Princeton, New Jersey
Position Type:Contract
Start Date / End Date: 05/14/2018 to 11/13/2018
CYBER SECURITY ANALYST
PRINCETON, NJ

Project Description:
Member of team that is responsible for detection and response for advanced threats, including monitoring, analyzing, categorization, and configuration and tuning of the SIEM application and related traffic collection, alerting and reporting capabilities. This team develops and implements new signatures and policies to optimize the SIEM correlation engine and streamline the log management capabilities. Recognizes and identifies potential threats to the network and systems connected to the network from the Internet and Intranet. Operates, documents, and maintains security controls. Monitor for, and investigate potential security breaches. The team also reviews internal and external network traffic to create policies that intercept Malware and other network attacks using RSA Security Analytics (Netwitness) and other network IDS capabilities. Additionally the team is responsible for the infrastructure support, configuration, and use of the FireEye HX Endpoint Detection and Response (EDR) environment, to detect and respond to advanced threats.
  • Consult on building correlation rules & alerts for the McAfee Enterprise Security Manager (Nitro) SIEM and RSA Security Analytics (NetWitness) products to identify malicious activities.
  • Support infrastructure of the FireEye HX environment.
  • Create host-based Indicator of Compromise (IoCs) FireEye HX.
  • Analyze and respond to FireEye Mandiant Intelligent Response hit reports.
  • Third-level support to review, triage, analyze, and respond to alerts received in SIEM.
  • Proactively review network data packets for potential attacks.
  • Malware analysis as appropriate.
  • Support forensic investigations as appropriate.


Required Skills:
  • Minimum of 5 years of InfoSec experience, preferably in a CIRT/SOC environment.
  • Minimum of 5 years but prefer 10+ years of Networking, TCP/IP, switching/routing/firewall experience.
  • Minimum of 2 years but prefer 5 years of Network analysis, with a focus on security, tcpdump, windump, wireshark.
  • Experience with host-based triage, forensics, and malware analysis using FireEye HX and Mandiant Redline or similar Endpoint Detection and Response (EDR) tool.
  • Experience analyzing network traffic with RSA NetWitness or similar network monitoring toolset.
  • Experience analyzing log events and alerts in a SIEM environment.
  • Experience using a malware sandbox such as Cuckoo.
  • Experience with cyber incident response.
  • Experience with software and OS vulnerability, CVE, patch and threat analysis.
  • Experience with CVEs, patch analysis, threat analysis.
  • Written and verbal communication at a level appropriate for customer interaction/visibility.
  • Bachelor's degree in a technical discipline is strongly preferred but will look at candidates with equivalent experience.

Helpful industry certifications:
  • CISSP, SANS GIAC (GCIA, GCIH, GCFA, GNFA), CCIE, CCNA, CEH, Security+, Network+, and other security vendor specific certs.


This 6+ month position starts ASAP.

Please E-MAIL your resume (attachment to email) with rate and availability to Steven: steven@alphaconsulting.com

ALPHA'S REQUIREMENT #18-00597
W2 ONLY MUST BE ELIGIBLE TO WORK IN THE U.S. AS AN HOURLY W2 EMPLOYEE