Job Description :

Client:

Duration: 12+ months

Interview: MS TEAMS


The candidate must be able to work onsite so local candidates/relocation only please. Please list the city and state where your candidate resides

Must Have List:

4+ years of experience with the following:

Cyber Security

Experience with FireEye, Defender, Securonix

SANS GCIA or GCIH

General Information

Candidate will be working in the Cyber Fusion Center (CFC) at Bristol-Myers Squibb. Candidate will be responsible for incident response activities to include network forensics, log analysis, and malware triage in support of incident response investigations, as well as report writing to support any investigations. With knowledge of the endpoint detect and response tools, the candidate will respond to triaged alerts on endpoint, network, server, cloud, and application technology. Incident response and handling are key skills, as well as a solid emotional quotient when dealing with users.

Work daily responding to enterprise wide alerts on our security controls

Triage and action malicious and suspicious detections in our environment

Provide metrics and reports as needed to demonstrate activity in the CFC IR

Position requirements:

Experience working in a global, heterogenous security environment

Experience with Shell scripting and PowerShell preferred.

Experience with Python

Security+ or equivalent security certification preferred.

Experience with regular expressions, bash/zsh (cat|cut|sed|sort|uniq|sort) and other parser technologies required.

Excellent communication skills, both written and verbal are required.

             

Similar Jobs you may be interested in ..