Security Analyst (CFCE/GCIH/GCIA/GREM/GCFA/GCFE/EnCE) with penetration testing, vulnerability scanning, Metasploit, Nessus, Burp, Core Impact, Audit and encryption experience

Job ID: IN-15602 (97491002)

Security Analyst (CFCE/GCIH/GCIA/GREM/GCFA/GCFE/EnCE) with penetration testing, vulnerability scanning, Metasploit, Nessus, Burp, Core Impact, Audit and encryption experience

Location: Indianapolis IN
Duration: 12 months

Qualifications of the Information Security Analyst need to include:
3-5+ years’ professional experience in network/cyber investigations, incident response, forensics or related InfoSec experience.
Relevant industry certifications are a plus: Certified Forensic Computer Examiner (CFCE) certification, GIAC Certified Incident Handler (GCIH); GIAC Certified Intrusion Analyst (GCIA); GIAC Reverse Engineering Malware (GREM); GIAC Certified Forensic Analyst (GCFA); GIAC Certified Forensic Examiner (GCFE); Encase Certified Examiner (EnCE)
Advanced working knowledge of forensic tools analyzing audit logs
Experience with UNIX, Linux, Mac, and Windows systems, and an admin level understanding of networking, firewalls, and the various protocols involved in data sharing and communications (e.g. how protocols work, their common ports, and common usage)
Working knowledge of current data collection, storage, and chain of custody best practices
Experience presenting findings and recommendations to C-suite, law enforcement, and legal counsel; excellent reporting skills (both written and verbal)
Perform data breach response, cyber risk/security assessments, and remain involved in phases such as penetration testing, vulnerability scanning, and log configuration
Experience with scan/assessment tools such as Metasploit, Nessus, Burp Suite, Core Impact, and/or others
Handle web application exploitation, server and client-side attacks, and protocol subversion
Perform IT System and Network Audits; write technical reports
Remain abreast of computer networks, hardware, communications, and connectivity
Bachelor’s degree or Master’s degree in Cyber Security, Computer Science, Information Security, or equivalent experience.
Knowledgeable of encryption and encoding methods, communication protocols, and algorithms

The ideal candidate will have hands-on experience performing and leading incident response cases, in addition to extensive knowledge of forensics and evaluating cyber security issues. This position requires competency in computer forensics, electronic discovery, and information security. The primary purpose of this position is to conduct computer forensic investigations, data recovery, and electronic discovery.

Responsibilities of the Information Security Analyst will include:

Investigate cyber security events, respond to cyber security incidents and coordinate mitigation efforts among various stakeholders. Assess digital forensic evidence such as audit log protocols (e.g. IIS log analyzer tools, application audit logs, etc.), databases, Internet browsing, network, file analysis, disk and data capture, etc.
Produce technical reports outlining risk to agency data resulting from a security incident.
Complete risk assessments based on digital evidence to determine any harmful impact of a security incident.
Lead computer forensics and data breach response activities utilizing industry best practice approaches.
Create strong narratives and analysis for after action reports and briefings to for executive leadership.
Responsible for the identification, preservation, and analysis of digital evidence’
Improve visibility and detection capabilities in cooperation with other business unit.

Leave a Reply