Sr Cyber Security Threat Analyst (Red Team) Biotechnology & Pharmaceuticals - Jacksonville, FL at Geebo

Sr Cyber Security Threat Analyst (Red Team)

This position independently develops, maintains, and implements comprehensive information security monitoring programs including defining security policies, processes and standards for large and complex environments. Perform comprehensive threat analysis and recommends appropriate course of action, mitigation, and remediation. Provide consultative guidance on the development of information security strategies and programs through demonstrated expertise and knowledge of industry trends and changes with respect to advanced and sophisticated cyberattacks and threats. Lead efforts, oversee work results, provide formal training and serve as a technical resource for Information Security team members. They are the single point of contact and coordination for third-party incident response teams and law enforcement agencies if the environment is breached. The position leads internal incident response, third-party incident response and interaction with law enforcement agencies by providing logs, reports, alert notifications, and other requested information.
Independently, proactively and automatically correlates and analyzes threat data from various sources and analyzes network events to establish the identity and modus operandi of malicious users active in the computing environment or posing potential threats to the computing environment. Provides guidance and assistance to junior members of the team.
Independently conducts industry research and technical evaluation of all sources and vendor supplied intelligence--with specific emphasis on network operations and advanced and sophisticated cyber tactics, techniques, and procedures
Subject matter expert in the detection and identification of cyberattack signatures, tactics, techniques and procedures associated with advanced threats
Leads assessments and development of cyber threat profiles of current events based on collection, research and analysis of open source information
Leads root cause analysis of any monitoring alerts and threats identified by third-party vendor, or internal systems and workforce. Once root cause is determined, proposes and leads cross-departmental efforts, if required, to implement appropriate security controls and solutions that will mitigate risk and vulnerabilities, as well as safeguard our systems and data.
Independently and proactively prepares detailed technical papers, presentations, recommendations, and findings for Management and other Technology Leaders
Develops and maintains documentation for security monitoring procedures and security diagrams
Leads the development of proposed design, configuration, and implementation of security monitoring architecture.
Serve as a subject matter expert for team members, specializing in network security monitoring, host analysis, and log analysis.
Required:
10 or more years of work experience in IT Security
Bachelor's degree in an IT related field or equivalent work experience
Strong technical knowledge of security architecture, tools and controls with specific demonstrated experience in proactive detection, mitigation, and resolution of advanced cyberattacks and/or threats
Strong technical knowledge of security infrastructure including security firewalls, data loss prevention, encryption, and end point protection appliances
In-depth knowledge of information threat analysis and detection concepts and principles and impact
Experience working and managing vendor performance and service level agreements
Proven leadership abilities including effective knowledge sharing, conflict resolution, facilitation of open discussions, fairness and displaying appropriate levels of assertiveness.
Proven ability to work under stress in emergencies with flexibility to handle multiple high pressure situations simultaneously.
Ability to communicate highly complex technical information clearly and articulately for all levels and audiences.
Ability to manage tasks independently and take ownership of responsibilities
Ability to learn from mistakes and apply constructive feedback to improve performance
Strong customer focus with ability to manage customer expectations and experience and build long-term relationships.
Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel.
Ability to adapt to a rapidly changing environment and quickly identify new trends and industry changes specific to security and advanced cyberattacks
High critical thinking skills required to evaluate complex, multi-sourced security intelligence information, analyze and confirm root cause, an independently identify mitigation alternatives and solutions that safeguard our technical environment.
Relevant Certifications (e.g., OSCP, CEH, GPEN, ECIH, ECSA, CSTA, etc.)
Preferred:
6 years of Security Operations Center Threat Analysis experience
Relevant certifications, CISSP, CEH, CISM, CRISC, etc
Experience in Agile methodology
. Apply now!Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.