Cyber Security Incident Response Manager (hands on role)other related Employment listings at Geebo

Cyber Security Incident Response Manager (hands on role)

Company Name:
Systems Technology International(STI), Inc
Location :Arlington, VA
Prestigious global publicly held Financial Institution is expanding its IT Security group and has created the following position:
This position will support the CISO by analyzing, documenting and responding to security events,
and performing incident response. The Cyber Security Incident Manager will monitor notifications
from security-centric systems (host-based security software, network firewalls, web application
firewalls, VPNs, IDS, URL Filtering, anti-malware, federated identity management, DLP, etc.),
and general-purpose IT systems (routers, switches, servers, storage, hypervisors, message
buses, databases, desktops, mobile devices, and cloud-based infrastructure and services) that
support security functions.
The Manager will support the CISO by developing scripts to automate functions where possible and occasionally develop custom tools to improve processes or support new capabilities.
This position requires strong analytic and written communications skills, such as those that would
be required to enable non-technical business managers to make informed, risk-based decisions related to incident containment and remediation.
This position should have a deep understanding and experience with network protocol analysis,
symmetric cryptography, public key infrastructure, SSL, information security analytics, Microsoft
Windows and Active Directory, Linux, open source software, scripting, SQL, and software
programming.
This individual should also act decisively and exhibit strong decision making skills and other
interpersonal skills, enabling them to work well with those around them.
This role offers a great growth opportunity in a supportive environment enabling the candidate to
deepen their skills in many aspects. If you have a passion for IT security and a hunger to learn,
this is a great lean-in opportunity for you.
Requirements:
Bachelors Degree and :
-7
years of relevant IT-related experience with an emphasis on
information security, required
-5
years of IT security operations and analysis or relevant
experience, required
-Familiar with network and host intrusion detection systems.
-Familiar handling information security incidents.
Experience in many of the following areas
- Proficiency with Windows and Linux.
-Proficiency with Apache.
- Proficiency with DAS, NAS, and SAN.
-Proficiency with IaaS (public, private, and hybrid models).
- Proficiency with programming or scripting (Python & Powershell
a plus).
- Proficiency with SQL and other query languages.
-Proficiency with network security and management tools.
- Proficiency with log analysis software and techniques.
- Proficiency with vulnerability assessment tools.
- Proficiency with wireless security tools.
- Proficiency with anti-virus tools.
-Proficiency with Hadoop, MapReduce, Apache Cassandra,
ElasticSearch.
- Awareness of current active defense techniques.
We have over 2000
permanent jobs available in our web site. Many jobs may match to your qualification, experience and location preference. Visit our web site and check it out what is best job for you and then apply. These jobs are with many medium to large companies including fortune 500 companies.
1. Search STI Professional Services in Google
2. You will see our web site and Just go through our job search link and search your appropriate job from there.
3. You can apply through our website directly with our customers.
Bookmark this site for new HOT job orders updated daily.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.