Responsibilities:
This technical position is responsible for eyes on glass monitoring, investigation and response to security incidents impacting iconectiv and its partner systems.
•Analyze events from various information sources within the environment and action any potential security concerns.
•Act as a lead throughout incident scenarios and provide subject matter expertise in cybersecurity incident response.
•Responsible for the successful execution of incident handling procedures as well as direct response to security incidents.
•Analyze and identify technical and procedural vulnerabilities, providing recommendations that enable timely remediation.
•Conduct host based and network forensics, log analysis and malware triage supporting incident response.
•Maintain current knowledge of and recognize attacker tools, tactics, and procedures to produce indicators of compromise (IOCs) that can be utilized during active and future investigations.
•Examine network topologies and application designs to understand and identify data flows throughout the environment.
•Assist with the creation of processes and procedures, technical documentation and completion of project goals.
•Provide regular feedback to enhance our security monitoring, response and controls.
•Provide mentorship to other Cybersecurity Analysts.
•Develop and oversee reporting that provide analytics and metrics to the global Cybersecurity Command Center.

Required Qualifications:
•5+ years’ experience in IT Security; 4+ years’ experience working in a Security Incident Response.
•Extensive knowledge of TCP/IP, Web, Linux, Windows and related technologies.
•Extensive knowledge of implementing and/or managing Security Information Event Management (SIEM) solutions (Arcsight, LogRhythm, Alien Vault, etc.)
•Experience reviewing and correlating raw log files in a security capacity (SEIM, AV, IDS, Firewall, Servers, Database, etc.).
•Strong understanding of regular expressions and pattern matching.
•Experience with command line and network tools (ping, traceroute, etc.)
•Ability to conduct packet analysis using common tools (tcpdump, Wireshark, etc.)
•Working knowledge of intrusion tools and techniques and detection methods at both the network and host level.
•Expert knowledge of common detection and prevention technologies such as AV, IDS/IPS, DLP, Proxy, Firewalls, etc.).
•Security Operations Center Lead or Supervisor role desired; experience managing SOC analysts
•Security certifications required, such as CISSP, CISM, CEH, CompTIA, GSEC

Additional Skills:
•Ability to present to management on audit findings, security recommendations, and incident response.
•Ability to strategically collaborate with other security, infrastructure, and engineering teams.
•Strong written and verbal communication skills; requires ability to communicate technical analysis to both technical and non-technical audiences.

View full description Apply Bridgewater, NJ Network Security 2510 Responsibilities:
This technical position is responsible for eyes on glass monitoring, investigation and response to security incidents impacting iconectiv and its partner systems.
•Analyze events from various information sources within the environment and action any potential security concerns.
•Act as a lead throughout incident scenarios and provide subject matter expertise in cybersecurity incident response.
•Responsible for the successful execution of incident handling procedures as well as direct response to security incidents.
•Analyze and identify technical and procedural vulnerabilities, providing recommendations that enable timely remediation.
•Conduct host based and network forensics, log analysis and malware triage supporting incident response.
•Maintain current knowledge of and recognize attacker tools, tactics, and procedures to produce indicators of compromise (IOCs) that can be utilized during active and future investigations.
•Examine network topologies and application designs to understand and identify data flows throughout the environment.
•Assist with the creation of processes and procedures, technical documentation and completion of project goals.
•Provide regular feedback to enhance our security monitoring, response and controls.
•Provide mentorship to other Cybersecurity Analysts.
•Develop and oversee reporting that provide analytics and metrics to the global Cybersecurity Command Center.

Required Qualifications:
•5+ years’ experience in IT Security; 4+ years’ experience working in a Security Incident Response.
•Extensive knowledge of TCP/IP, Web, Linux, Windows and related technologies.
•Extensive knowledge of implementing and/or managing Security Information Event Management (SIEM) solutions (Arcsight, LogRhythm, Alien Vault, etc.)
•Experience reviewing and correlating raw log files in a security capacity (SEIM, AV, IDS, Firewall, Servers, Database, etc.).
•Strong understanding of regular expressions and pattern matching.
•Experience with command line and network tools (ping, traceroute, etc.)
•Ability to conduct packet analysis using common tools (tcpdump, Wireshark, etc.)
•Working knowledge of intrusion tools and techniques and detection methods at both the network and host level.
•Expert knowledge of common detection and prevention technologies such as AV, IDS/IPS, DLP, Proxy, Firewalls, etc.).
•Security Operations Center Lead or Supervisor role desired; experience managing SOC analysts
•Security certifications required, such as CISSP, CISM, CEH, CompTIA, GSEC

Additional Skills:
•Ability to present to management on audit findings, security recommendations, and incident response.
•Ability to strategically collaborate with other security, infrastructure, and engineering teams.
•Strong written and verbal communication skills; requires ability to communicate technical analysis to both technical and non-technical audiences. Responsibilities: