Looking for a Computer Network Defense Information Security Specialists ISSs experienced in working in Security Operations Center SOC environment and who will be responsible for analysis of data collected using a variety of Computer Network Defense tools CND including intrusion detection system alerts, firewall and network traffic logs and host system logs to analyze events or perform threat or target analysis that occurs within the environment. The CND ISS must conduct unstructured investigative analysis of events/incidents and is responsible for managing the event through its lifecycle. Analysts should be capable of making decisions around prioritization of incidents based on the nature of the situation and should react with a heightened sense of urgency. Notify management, incident responders and other team members of suspected incidents and articulate the event's history, status and potential impacts for further action. Must work in a team environment that requires strong communication and partnership with other group members to diagnose and resolve security related events. ISS's may be engaged in security related projects as needed. ISS's must be strong problem solvers with the ability to methodically and objectively analyze and resolve information security challenges. ISSs must have the ability to identify opportunities for proactive work by using tools and information available. ISS's should be willing to work in Shifts or in times as required by the business.
Inside this Business Group
Minimum Requirements:-Should have at least a technical bachelor's degree in Engineering. Masters in Engineering is highly desirable. 3-5 years or more experience in an NOC/SOC environment. English skills at an intermediate to advanced level both written and spoken with strong communication skills are a must-Ability to perform analysis of log files from a variety of sources within the Network Environment or DMZ including host logs, network traffic logs, firewall logs and IDS system logs. -Experience in monitoring external data sources to maintain currency of CND threat conditions and determine which security issues may have an impact on the Network Environment. -GSEC, GCIH, GCIA, GNFA, SANS certifications are preferred. Other preferred Requirements: -Understanding of web application threats and penetration testing concepts.-Experience in Cloud Security and Penetration testing-Strong analytical and critical thinking skills-This person must be able to manage his personal performance, with a highly action orientation attitude and able to resolve complex problems.-Been able to partnering with another business groups, L3, engineers and a wide range of stakeholders-Experience in performing event correlation using information gathered from a variety of sources within the network environment to gain situational awareness and determine the effectiveness of an observed attack. -Demonstrated understanding of platform security fundamentals Hardware, Windows, and Linux. Must be able to write scripts using languages as Python and/or PowerShell -Additional certifications * McAfee Certified Product Specialist SIEM certification or its equivalent in experience is a strong plus * Certified Ethical Hacker CEH knowledge is a strong plus. * CISM / CISA / CISSP is highly desired.
Intel's Information Technology Group (IT) designs, deploys and supports the information technology architecture and hardware/software applications for Intel. This includes the LAN, WAN, telephony, data centers, client PCs, backup and restore, and enterprise applications. IT is also responsible for e-Commerce development, data hosting and delivery of Web content and services.