Cyber Security Forensic Analyst

The Maritz Motto “Work hard, have fun and get the job done.” Maritz does business with 30 of the FORTUNE 50 companies in the world. Our environment is built on teamwork, creativity and personal growth. We provide our people with the resources to reach their full potential.
Through our people-centered practices, strong community partnerships and wellness initiatives, we offer employees the opportunities to improve their careers, their community and their health.

People-Centered Practices Maritz’ focus on the science and art of people and potential extends to our own employees. With personalized programs and an inclusive culture, employees have the chance to improve their professional skills, recognize one another for special achievements, and enjoy an excellent work-life balance.

Come join a newly built world-class team of cybersecurity experts working to protect Maritz customers and the business enterprise. Work at a place that has a meaning and a purpose working for great leadership and an excellent company culture. Take your career to the next level where you will be challenged to professionally grow your long-term cybersecurity career of delivering excellence and maturing a cybersecurity program.

Maritz currently has an opening for a Cyber Security Forensic Analyst.
The Cyber Security Forensic Analyst position is responsible for detecting, responding, and assessing cyber security threats and incidents across the Maritz environment. The Cyber Security Forensic Analyst works among a team of skilled analysts in the Security Operations Center and is an active member of the Incident Response team, responding to anomalous activity as needed within the environment.

Responsibilities and Duties:
Conduct incident response activities, including advanced investigation (forensic, malware analyses, root cause analysis, etc.) to investigate potential intrusions and develop remediation guidance
Responsible for understanding the global threat landscape by utilizing cyber threat intelligence
Perform the activities necessary for the immediate, short-term rapid resolution of incidents to minimize risk exposure and production down-time
Documenting event analysis and writing comprehensive reports of incident investigations
Proactively provide feedback on SOC operational processes and procedures
Maintain a professional communicative relationship with internal customers and management to provide information throughout the incident
Routinely develop and update incident response playbooks to ensure response activities align with best practices, minimize gaps in response and provide comprehensive mitigation of threats.
Assist with the deployment and maintenance of security sensors and tools
Monitor security sensors and review logs to identify intrusions
Review and process threat intel reports
Assist with developing and implementing detection use cases
Participate in on-call rotation for after-hours security and/or engineering issues
Assist with security assessment reports & provide recommendations
Participate with table top exercises

5+ years of overall IT professional experience.
2+ Experience working in a forensics capacity.
Ability to perform packet analysis & malware detection.
Thorough understanding of fundamental security and network concepts (Operating systems, intrusion/detection, TCP/IP, Firewalls, End-Point Detection, forensic tools, etc.).
Experience with Reverse Engineering malware, both static and dynamic analysis.
Experience with IDA or OllyDbg.
Familiarity with assembly code on 32/64 bit platforms is preferred.
Previous experience generating custom YARA rules.
Experience with enterprise SIEM or ELK Stack.
Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation in a fast-paced environment.
Excellent written and oral communication skills.
Hands-on troubleshooting, analysis, and technical expertise to resolve security events; previous experience in troubleshooting day-to-day operational processes such as security monitoring, data correlation, researching events, etc.
Prefer BS in Engineering, Computer Science, Information Security, or Information Systems or equivalent work experience.
Security certifications (e.g. Security+, Network+, GCIA, GCIH, CISSP, GREM, CEH, or similar certification desirable).
Maritz is an Equal Opportunity Employer.


. . . . . . . .

Leave a Reply