#Cyber #Incident Response #Analyst

Are you passionate about solving challenging problems?
Do you thrive being a critical part of an elite team of like-minded people?
How would you like for your next career move to take you to the next level?
If any of this sounds appealing, look no further.
Job Description:
    • This position provides Incident Response Analyst support for a commercial enterprise-level Cyber Security Incident Response Team
    • Supports security incident response including tracking of incidents from discovery to mitigation, and coordination of Incident Response workflows and reports.
    • Upon identification of an event, this position will triage, and work to collect digital artifacts for further investigation and escalation as appropriate
    • Assist with Incident response triage activities to determine the category, type, severity and risk impact of the incident.
    • Assist with coordination support efforts for client’s Incident Response team and dissemination of information as necessary for proper communication and management of the incident.
    • Assist in malware analysis, and memory/network/endpoint forensics
    • Provides status reports that summarizes activities completed, key engagement statistices, issues requiring attention, and plans/action items for the next reporting period.
Basic Qualifications:
    • Understanding of cyber security incident responses process and procedures
    • Understanding of security operations, monitoring and detection, network traffic analysis, cyber threat, adversary techniques, log aggregation and correlation, scripting
    • 2-3 years work experience in a related field – cyber security incident response, monitoring and detection, cyber threat intelligence, malware analysis, forensics, reverse engineering, vulnerability exploitation
Desired Skills:
    • Cyber security incident response experience and skills
    • Experience working with or knowledge of Encase, SANS SIFT workstation, Internet Evidence Finder, Volatility, Mandiant Redline, Splunk, and FTK (Forensic ToolKit)
    • General understanding of automated sandbox technology and reporting
    • Experience working with or familiary with SOC tools including SIEM, IDS, etc.
    • Bachelors in technology or mathematics discipline
    • Industry security certification – CISSP, GCFA, GCFE, and/or GREM
So what does Novetta do?
We focus on three core areas: Cyber, Entity, and Multi-Int Analytics. Our products are focused on processing and analyzing vast amounts of data in these core areas. Our services are focused on helping our customers move from complexity to clarity. At Novetta, we bridge the gap between what our customers think they can do and what they aspire to achieve.
Our culture is shaped by a commitment to our Core Values:
Integrity: We hold ourselves accountable to the highest standards of integrity and ethics.
Customer Mission Success: Customer mission success drives our daily efforts—we strive always to exceed customer expectations and focus on mission success beyond contractual commitments.
Employee Focus: We value our employees and demonstrate our commitment to them by providing clear communications, outstanding benefits, career development, and opportunities to work on problems and technical challenges of national significance.
Innovation: We believe that innovation is critical to our success – that discovering new and more effective ways to achieve customer mission success is what makes us a great company.

Get a referral bonus for the great people you know! With our amazing referral program, you could be eligible to win outstanding rewards for referring qualified new hires to Novetta.

Novetta is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law.

Source: indeed