SanFranRecruiter Since 2001
the smart solution for San Francisco jobs

Expert Incident Response Analyst

Company: PG&E Corporation
Location: Hercules
Posted on: May 6, 2021

Job Description:

Requisition ID-# 79382-Job Category : Information Technology-Job Level : Individual ContributorBusiness Unit: Information Technology Department SummaryThe Cybersecurity function is led by PG&E's Senior VP and Chief Information Officer and is responsible for cybersecurity and risk management across the organization.-The Security Intelligence and Operations Center (SIOC) is responsible for ensuring that PG&E proactively identifies and assesses threats to its user and operational network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.-Position Summary -This is a challenging and fast passed position in PG&E's Security Intelligence and Operations Center (SIOC) which is responsible for detecting, analyzing and responding to any suspicious cyber security activity across PG&E's business and operational networks. The SIOC is a critical team within PG&E's broader Information Security team.-Job Responsibilities-

Utilizes digital forensic tools including Guidance EnCase to execute digital investigations and perform incident response activitiesConduct investigations of computer-based events and other security issuesEstablishes links between suspects and other violators by piecing together evidence uncovered from a variety of sourcesEstablishes and maintains defensible evidentiary process for all investigationsUses & maximizes relevant investigative tools, software and hardwareExperience with / daily use of EDRFamiliarity with cloud service providers (AWS) and associated security tools desired Collection and examination of images of various platforms/devices (including Windows, Mac, mobile devices)Coordinates with IT to leverage skills and resources in support of investigationsAdvances the practice and science of information security investigationPerform hunting for malicious activity across the network and digital assetsRespond to computer security incidents and conduct threat analysisConducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the networkPerform detailed investigation and response activities for potential security incidents Provide accurate and priority driven analysis on cyber activity/threats Perform payload analysis of packetsPerform dynamic analysis on suspected malware samplesRecommends implementation of countermeasures or mitigating controlsEnsures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environmentCollaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activityDevelop innovative monitoring and detection solutions using PG&E tools and other skillsets such as scriptingMentor junior staff in cybersecurity techniques and processesResolve or coordinate the resolution of cyber security eventsMaintain incident logs with relevant activity Document investigation results, ensuring relevant details are passed to senior analysts and stakeholders Participate in root cause analysis or lessons learned sessions Write technical articles for knowledge sharingEstablish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units -Qualifications -Minimum:
High school diploma or equivalent 6 years of related IT work experience to include information security working within incident response/forensics or equivalent functions within Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC) experience-Desired:
Bachelor's degree in Cybersecurity, Intelligence, or a related field or equivalent work experience; or a combination of education, training, and relevant work experience. Formal IT Security/Network Certification such as WCNA, CompTIA Security +, Cisco CCNA, SANS GCIH, GMON, or other relevant Cyber Security certificationsUtility Industry experienceSANS GIAC Certified Forensic Analyst (GCFA) or SANS GIAC Certified Forensic Examiner (GCFE) or SANS GIAC Reverse Engineering Malware (GREM) or related DegreeExperience with scripting in Perl/Python/Ruby/PowerShellExperience with both desktop-based and server-based forensicsMalware reverse engineering skills-Knowledge, Skills, and Abilities/Technical Competencies:
Previous experience with a variety of cyber investigation toolsStrong technical skills including malware analysis, memory forensics, live response techniques, registry analysis, scripting, and other relevant technical security skills such as memory forensicsExperience investigating and mitigating APT style attacksStrong case management and forensic procedural skills- Intelligence driven defense utilizing the Cyber Kill ChainDeep knowledge of log, network, and system forensic investigation techniquesDeep knowledge of diverse operating systems, networking protocols, and systems administrationDeep knowledge of commercial forensic tools - working knowledge of Axiom preferredDeep knowledge of common indicators of compromise and of methods for detecting these incidentsDeep knowledge of IT core infrastructure and cyber security components/devicesDeep knowledge of TCP/IP Networking and knowledge of the OSI modelSignificant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs Excellent problem solving, critical thinking, and analytical skills - ability to de-construct problemsStrong customer service skills and decision-making skills Significant experience with packet analysis (Wireshark) and malware analysis preferredWorking knowledge of PG&E infrastructure preferredIBM QRadar experience preferred

Keywords: PG&E Corporation, San Francisco , Expert Incident Response Analyst, Professions , Hercules, California

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category
within


Log In or Create An Account

Get the latest California jobs by following @recnetCA on Twitter!

San Francisco RSS job feeds