Cybersecurity Threat Principal Analyst

at  Truist Bank

Atlanta, GA 30309, USA -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate22 Sep, 2024Not Specified22 Jun, 20248 year(s) or aboveNetwork Administrator,Ccna,Remediation,Security,Security+,Disabilities,Computer Science,Web Development,Incident Response,Security Operations,Database Administration,Security Operations Center,Mastery,Microsoft Azure,General Technology,IpsNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

THE POSITION IS DESCRIBED BELOW. IF YOU WANT TO APPLY, CLICK THE APPLY NOW BUTTON AT THE TOP OR BOTTOM OF THIS PAGE. AFTER YOU CLICK APPLY NOW AND COMPLETE YOUR APPLICATION, YOU’LL BE INVITED TO CREATE A PROFILE, WHICH WILL LET YOU SEE YOUR APPLICATION STATUS AND ANY COMMUNICATIONS. IF YOU ALREADY HAVE A PROFILE WITH US, YOU CAN LOG IN TO CHECK STATUS.

Need Help?
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won’t receive a response).

PLEASE REVIEW THE FOLLOWING JOB DESCRIPTION:

The Principal Incident Response Analyst on the advanced 24/7 Cyber Incident Response Team (CIRT) is responsible for receiving, investigating, and resolving all escalations properly. As Digital Forensics & Incident Response (DFIR) professionals, individuals in this role must be well-versed in log, code, identity, cloud, network, endpoint, memory, malware, and root cause analysis. This role will directly perform, facilitate, or consult on the entire cyber incident response process.
Principal IR analysts must have a strong knowledge of windows internals and cloud (Azure, AWS) to effectively threat hunt and respond to advanced attacks. The ability to quickly identify nefarious artifacts versus benign activity will be a key skill for this position. Principal IR analysts must have problem solving skills for structured, unstructured, and complex situations.
This role is on-site in downtown Atlanta (alternate location Zebulon, NC) and will participate in an on-call rotation with the following shift options:
1st Shift, 7am to 4pm, Tuesday to Saturday (5-8 Schedule)
1st Shift, 7am to 6pm, Friday, Saturday, Sunday, Monday (4-10 Schedule)

REQUIRED QUALIFICATIONS:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor’s degree in Computer Science or related field or equivalent education and related training
2. Eight years of experience in Cybersecurity or related work
3. Broad knowledge of general IT with mastery of one or more of the following areas: operating systems, networking, computer programing, web development or database administration
4. Demonstrated advanced knowledge of cyber security operations with mastery of one or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation
5. Experience with systems for automated threat intelligence sharing using industry standard protocols, such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indication Information (TAXII) Advanced knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information
6. Ability to lead and persuade individuals and large teams on ideas, concepts and opportunities

PREFERRED QUALIFICATIONS:

  • Bachelor’s degree in Computer Science or related field or equivalent education and related training
  • Eight years of experience in Cybersecurity or related work
  • Broad knowledge of general IT with mastery of one or more of the following areas: operating systems, networking, computer programing, web development or database administration
  • Demonstrated advanced knowledge of cyber security operations with mastery of one or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation
  • Experience with systems for automated threat intelligence sharing using industry standard protocols, such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indication Information (TAXII) Advanced knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information
  • Ability to lead and persuade individuals and large teams on ideas, concepts and opportunities
  • Experience working in cloud environments, namely Microsoft Azure
  • Working familiarity with programming best practices.
  • Industry certifications in general technology and security (e.g. Network+, Security+, CySA+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, etc.)
  • Industry certifications in cyber forensics and incident response, such as GIAC Certified Forensic Analyst (GCFA), Certified Forensic Computer Examiner (CFCE), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Incident Handler (GCIH) and other related credentials
  • Industry certifications in networking, such as Cisco Certified Network Associate (CCNA), Certified Wireless Network Administrator (CWNA) and/or Net+ and experience in the Intelligence Community (IC)
  • Demonstrated technical leadership experience

Responsibilities:

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Conduct cyber investigations for escalated and challenging computer security incidents using computer forensics, network forensics, root cause analysis and malware analysis.
  • Develop tactical and strategic cyber intelligence from acquired threat intelligence and technical indicators from external and internal sources.
  • Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.
  • Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.
  • Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
  • Identify new threat tactics, techniques and procedures used by cyber threat actors.
  • Proactively engage in threat hunting activities to proactively search for threats in the enterprise environment.
  • The role is shift-based with weekend days and on-call support required.
  • Position is located in Atlanta with weekly on-site expectations in our downtown Cyber Fusion Center (CFC).


REQUIREMENT SUMMARY

Min:8.0Max:13.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Other

Graduate

Computer science or related field or equivalent education and related training

Proficient

1

Atlanta, GA 30309, USA