Security Incident Handler Posted Jan 13
Request Technology - Robyn Honquest , Northbrook, IL
SOC, SIEM, ArcSight preferred. TCPIP, IDS, IPS, Tier 2 security incidents.

The Security Analyst (Tier 3) will perform responsibilities as the technical lead for Company's Security Operations Center (SOC), leading technical investigations for security incidents, overseeing process improvements, and driving implementation of new capabilities. Serve as a technical escalation resource for other SOC Analysts and provide mentoring for skill development. Partner with Security Engineers to implement and improve technology and process to enhance SOC monitoring, investigation, and response.

Job Description

Serving as an escalation resource and mentor for other analysts

Perform investigation and escalation for complex or high severity security threats or incidents

Work with SIEM Engineering and other security partners developing and refining correlation rules

Work on complex tasks assigned by leadership, which may involve coordination of effort among Tier 1/2 analysts

Coordinate evidence/data gathering and documentation and review Security Incident reports

Assist in defining and driving strategic initiatives

Create and develop SOC processes and procedures working with Tier 2 Analysts

Provide recommendations for improvements to Company's Security Policy, Procedures, and Architecture based on operational insights

Define and assist in creation of operational and executive reports

Define tool requirements to improve SOC capabilities

Provide leadership and technical guidance in project planning, task definition, estimating, reporting, scheduling, documentation, and workflow.

Job Qualifications

At least 10 years of technical experience in Information Security, System Administration, or Network Engineering with at least 5 years of experience in Information Security. Experience in Security Operations and Incident Response. College degree in related field or equivalent work experience.

Preferred Competencies:

Advanced event analysis leveraging SIEM tools (ArcSight preferred)

Advanced incident investigation and response skill set

Advanced log parsing and analysis skill set

Advanced knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)

Advanced knowledge of current threat landscape (threat actors, APT, cyber-crime, etc)

Advanced knowledge of malware operation and indicators

Advanced knowledge of penetration techniques

Moderate to Advanced knowledge of DDoS mitigation techniques

Moderate to Advanced knowledge or IDS/IPS systems

Moderate to Advanced knowledge of Windows and Unix or Linux

Moderate knowledge of Firewall and Proxy technology

Moderate knowledge of Data Loss Prevention monitoring

Moderate experience with Scripting

Moderate knowledge of forensic techniques

Moderate protocol analysis experience (Wireshark, Gigastor, Netwitness, etc.)

Moderate knowledge of audit requirements (PCI, HIPPA, SOX, etc.)

Experienced in mentoring and training Junior Analysts

Security Certifications Preferred (Including but not limited to the following certifications):

- Certified Incident Handler (GCIH)

- Certified Intrusion Analyst (GIAC)

- Certified Ethical hacker (CEH)

- Certified Expert penetration tester (CEPT)


- Networking Certifications (CCNA, etc)

- Platform Certifications (Microsoft, Linux, Solaris, etc)

Employment Type: Permanent
Work Hours: Full Time

Pay: $120,000 to $125,000 USD
Pay Period: Annual
Other Pay Info: Bonus

Click here to apply - Please mention that you saw the job on The Tech Report