Role- Cyber Security Analyst
Location –New Jersey Information Technology (IT)
Job Type Contract- Hire Length: 6month
Client: UBS New York International
Do you have a knack for information security?
Are you at your best when you need to analyze information security related incidents?
We're looking for someone like that to:
· Analyze malware samples to understands its behavior, assess threat actor motivations, and extract indicators of compromise (IOCs)
· Act upon threat intelligence provided by Cyber Threat Intelligence function
· Respond to Information Security related queries
· Perform cyber threat hunting for the detection of advanced threats
· Mentor and train junior analysts to enhance the overall technical skillset of the SOC, establish analytic discipline and critical thinking, and promote greater curiosity
· thinking "outside the box"
· Expand, tune, and enhance rulesets – SIEM, IDS, etc.
· to identify security incidents and reduce false positives
· Investigate IOCs provided by Cyber Threat Intelligence or the Cyber Hunter function
· Handling incidents – encompassing multiple functions: detection and identification, incident triage, network and host-based forensic analysis, root-cause analysis, containment, system hardening, etc.
· We are involved in different type of information security incidents (phishing, malware, denial of service, inappropriate usage and unauthorized access).
· We are a young and empowered team who always drives for continuous improvement.
· Your experience and skills You have:
· A natural ability to solve complex issues through analytical and lateral thinking
· Performed proactive hunting; have detected anomalous and potentially malicious activity in log data
· Master's degree in a STEM field with 3+ years of relevant experience;
· Bachelor's degree in a STEM field with 5+ years of relevant experience; or 9+ years of incident response, malware analysis, and threat detection
· Hands-on experience with content development and use-case management
· Proficiency in log parsing and data analysis (REGEX is a must)
· Proficiency in x86 assembly language, disassemblers, and debuggers
· Hands-on experience with Volatility or similar malware analysis/forensic tools
· Proficiency in static and dynamic malware analysis
· Demonstrable proficiency in code de-obfuscation and anti-forensic techniques
· Fluency in at least one compiled language (C, C++, etc.) and one scripting language (Python, Perl, etc.)
· A firm understanding of the TCP/IP stack and networking (knowing the difference TCP and UDP is not enough)
· Moderate to advanced understanding of DDoS attacks and mitigation techniques
· Fluent in English
· Security Certifications – GNFA, GCFE, GPEN, and GREM – OSCP and OSCE must
**Entry-level Healthcare Analyst****Position Overview**Cognizant is helping healthcare leaders make the shift-with practical insights, more... ...Software Engineering, Information Systems, Decision Sciences, Data Analytics/Data Science.+ Internship or academic experience...
...regular check-ins with current customers. The Member Experience Manager needs to have customer service in the front of their mind to... ...responsible for building and maintaining financial profiles for personal training customers. As the leader of the clubs personal training...
...knowledge, and experiences you need to lead and deliver value at this level include but are not limited to:+ Craft and convey clear,... ...about how we work: PwC does not intend to hire experienced or entry level job seekers who will need, now or in the future, PwC sponsorship...
...Job Summary By joining our BV Construction group, you will have the ability to develop and enhance your skills in an on-site, hands... ...construction phases. Project types could include water transmission pipelines, water pump stations, wastewater collection systems,...
...industry. We are seeking a highly organized and detail-oriented Virtual Assistant to join our remote team. The virtual assistant's primary... ...of the position Must be willing to submit up to a LEVEL II background and/or security investigation with a fingerprint...