Incident Response Analyst (Caba)

Incident Response Analyst (Caba)

New Talent

Incident Response Analyst (Caba)

Detalles de la oferta

AtNew Talent, we are looking for our Client, anImportant Multinational Services Company, aIncident Response Analystto join theGlobal Service Center in Buenos Airesfocused on providing high quality services to our internal clients around the world.
The Incident Response Analyst provides detection, containment, and analysis of security events to protect the confidentiality, integrity, and availability of information systems in accordance with the firm's business objectives, regulatory requirements, and strategic goals.

Provide Tier 2 incident response services to the global organization on behalf of the Information Security Team.
Receive, process, and resolve tickets per defined SLA's.
Analyze information garnered from monitoring systems, operational incidents, and other sources to determine the scope and impact of potential security incidents, and process accordingly.
Critically assess current practices and provide feedback to management on improvement opportunities.
Assist with the design and implementation of threat detection and prevention solutions identified as necessary for the protection of Firm assets.
Effectively utilize common IR toolsets, platforms, and processes, such as SIEM, log management, packet capture, and breach detection systems.
Provide assistance with forensic examinations and chain -of-custody procedures as directed by the Security Incident Response Engineers.
Provide input into standards and procedures.
Report compliance failures to management for immediate remediation.
Maintain assigned systems to ensure availability, reliability, integrity, including the oversight of current and projected capacity, performance, and licensing.
Provide status reports and relevant metrics to the Security Operations Manager.
Contribute to the Firm's security-related information repositories and other marketing/awareness endeavours.
Applied knowledge of IR concepts and best practices, including forensics and chain-of-custody.
Experience with common IR tools such as SIEM, log management, IDS, breach detection systems (APT/BDS/EDR), and packet capture.
Broad understanding of TCP/IP, DNS, common network services, and other foundational topics.
Intermediate knowledge of malware detection, analysis, and evasion techniques.
3+ years experience in malware analysis (executables, scripts, office documents), rootkits, bootkits, traffic analysis (Wireshark) and proficient use of disassemblers (IDAPro) or debuggers (OllyDBG, winDBG).
Experienced in penetration testing and vulnerability assessment on enterprise systems and networks to enhance network security. Experienced in web application penetration testing with BurpSuite or other similar web application security tools. Knowledgeable with software attack and exploitation techniques.
Broad familiarity with the threat landscape and the ability to adapt practices to evolving circumstances.
Experienced threat hunter using with use of MITRE's ATT&CK or similar framework. Familiar with the hunting maturity model and understand a variety of different types of data analysis techniques to identify malicious activity. Created and published hunting procedures.
Ability to gather and analyze facts, draw conclusions, define problems, and suggest solutions.
Maintain critical thinking and composure under pressure.
Strong written and oral communication skills. Ability to convey complex concepts to non-technical constituents. Proficiency in oral and written English.
Capable of providing assistance with the preparation of internal training materials and documentation.
Ability to be productive and maintain focus without direct supervision.
Passionate in the practice and pursuit of IR excellence.
Exhibits a disciplined and rigorous approach to incident handling.
Willing to accommodate shift-based work for a global organization.
Provide exemplary customer service by striving for first call resolution and demonstrating, empathy, respect, professionalism, and expertise.
2+ years experience with digital forensics on host or network and identification of anomalous behavior on network or endpoint devices. Knowledgeable with industry standard forensic best practices while imaging, preserving, transporting and handling electronic data from a diverse set of digital data sources, including laptop and desktop computers, servers, networks and mobile devices.

1. Minimum Education and Experience - Describe the minimum levels of formal education and experience that are required to successfully perform this position's responsibilities.
• Possess a Computer Science Bachelor’s Degree or substantial equivalent experience
• Five years of professional experience in information security with a focus on incident response and forensics.
Special Requirements, Licenses, and Certifications
CISSP or SSCP desired

Participate in special projects as needed.

No especificado

Horario: Full-time

Fuente: UniversoBit


  • Otros / Otros



  • Desktop

Ofertas Relacionadas

Scrum master

Dicsys S.A empresa especializada en Business Analytics y Business Intelligence, con sede en Córdoba y Buenos Aires, se encuentra en la búsqueda de perfiles...

Desde Dicsys - Córdoba

Publicado hace un mes

Payroll analyst (temporary)

Job ID: R-31813Job Description SummaryLocation(s): Argentina City/Cities: Capital Federal Travel Required: 00% - 25% Relocation Provided: No Job Posting End...

Desde The Coca-Cola Company - Capital Federal

Publicado hace un mes

Regional medical affairs, latin america

By clicking the “Apply” button, I understand that my employment application process with Takeda will commence and that I agree with Takeda’s Privacy Notice...

Desde Takeda Pharmaceuticals - Capital Federal

Publicado hace un mes

Consultor sap ps con s/4 hana

Proyecto de Implementación en Puerto Madero Compañía francesa en telecomunicaciones Requisitos Experiencia en SAP PS Experiencia con HANA Experiencia en...

Desde Itproviders - Capital Federal

Publicado hace un mes