Client:
Duration: 12+ months
Interview: MS TEAMS
The candidate must be able to work onsite so local candidates/relocation only please. Please list the city and state where your candidate resides
Must Have List:
4+ years of experience with the following:
Cyber Security
Experience with FireEye, Defender, Securonix
SANS GCIA or GCIH
General Information
Candidate will be working in the Cyber Fusion Center (CFC) at Bristol-Myers Squibb. Candidate will be responsible for incident response activities to include network forensics, log analysis, and malware triage in support of incident response investigations, as well as report writing to support any investigations. With knowledge of the endpoint detect and response tools, the candidate will respond to triaged alerts on endpoint, network, server, cloud, and application technology. Incident response and handling are key skills, as well as a solid emotional quotient when dealing with users.
Work daily responding to enterprise wide alerts on our security controls
Triage and action malicious and suspicious detections in our environment
Provide metrics and reports as needed to demonstrate activity in the CFC IR
Position requirements:
Experience working in a global, heterogenous security environment
Experience with Shell scripting and PowerShell preferred.
Experience with Python
Security+ or equivalent security certification preferred.
Experience with regular expressions, bash/zsh (cat|cut|sed|sort|uniq|sort) and other parser technologies required.
Excellent communication skills, both written and verbal are required.