Washington, DC
Incident Response - Malware/Reverse Engineer
Position: Incident Response - Reverse Engineer/Malware Analyst
Location: Washington DC (Metro Accessible)
Onsite: Hybrid (2 days a week)
Duration: Long Term Contract
Overview:
- 8+ years of Incident Response experience, preferably in a large and/or global organization.
- Remediate security incidents and respond to suspicious emails.
- Develop recommendations intended to enhance security over the medium-to-long term planning horizon.
- Automate Security incident and threat hunting runbooks using XSOAR.
- Document Security incidents reports and forensic reports.
- Modification skills, preferably with Python.
- Bachelor's degree in computer science, information technology, systems engineering, or a related field.
- Commiserate certification preferred.
Objectives:
- Participate in all the phases of incident response process, including detection, containment, eradication, and post-incident reporting.
- Conduct thorough investigative actions based on security events and remediate as dictated by standard operating procedures.
- Timely identification, collection, correlation, and dissemination of threat intelligence through the use of various security systems (e.g. SIEM system, IDS/IPS, scanners).
- Detect and respond to intrusion or security breaches.
- Perform malware analysis, using available tools, techniques and standard operating procedures.
- Document vulnerabilities and exploits used while analyzing a malware.
- Perform research on vulnerabilities, exploits, zero-day Malware and then provide early alerts to Security Engineering team along with mitigation strategy.
- Ensure the accuracy and integrity of information throughout reporting.
- Assist the Incident response lead in developing and setting up frameworks for developing incident response toolkit.
- Assist in the designing and development of tools for detection, protection, containment of malicious activity.
- Monitor access control and authorization systems and practices.
- Conduct research pertaining to the malware, intrusions, etc. and the latest techniques for combating them.
- Respond to day-to-day security requests relating to Logrhythm operations.
- Support Security Engineers in developing data and reports.
- Provide escalated response and support to intrusion or security breach investigations.
- Automate security management processes including alerting, network management.
- Assess, design, and recommend security incident avoidance platform based on systems resiliency models.
- Monitor access control and authorization systems and practices of security architecture.
- Identify commonalities and differences between malware samples for purposes of grouping or classifying for attribution purposes.
- Perform research on vulnerabilities, exploits, zero-day Malware and then provide early alerts to Security Engineering team along with mitigation strategy.
- Ensure the accuracy and integrity of information throughout reporting.
- Provide technical input on threat and vulnerability risks.
- Support all aspects of Security Information and Event Management initiative.
- Support the establishment, enhancement, and continual improvement of an integrated set of correlation rules, alerts, searches, reports, and responses.
- Coordinate and conduct an event collection, log management, event management, compliance automation, and identity monitoring activities.
- Tune Logrhythm performance and event data quality to maximized Logrhythm system efficiency and detection capabilities.
- Continuously improve security monitoring program leveraging log analysis, data mining and security alerting (SIEM).
- Assist with analyst using Logrhythm and other tools to detect and respond to IT security incidents.
- Must be able to support data collection from a large, complex server and network infrastructure and user base.
- Periodically review an existing intelligence feed maintained in SIEM tool to remove false positives.
- Configure Security rules and policies in Azure services and ensure alerting is configured via MCAS.
- Leverage Azure Advanced Threat hunting and KQL to perform investigation on the alerts that are generated and escalated by Security Monitoring.
- Perform Disk and Memory forensics using Access Data and Encase.
- Perform Top-talker analysis and identify anomalies using Riverbed solution.
Recommended Skills
- Access Controls
- Architecture
- Automation
- Computer Security
- Data Collection
- Data Quality
Browse other jobs