Job Details

Information Security Specialist

CHICAGO-60611, IL, US
11/04/2016

-


Required Skills

    CISSP
Company

Infinity Consulting Solutions, Inc

Experience

7 to 9 Year(s)

Job Description

Overview:

The Information Security Specialist for the Cyber Security & Operations function is responsible for providing continuous threat monitoring and incident response services.

This individual is responsible for monitoring, developing, and maintaining the tools, technologies, and processes that enable the organization to detect and prevent computer security threats.

The Information Security Specialist acts as a subject matter expert and works with cross-functional teams as required to perform incident investigations and response activities.

This individual participates in the Information Security Operations Center which provides timely investigation and response to potential IT incidents through the continuous monitoring and tracking of security events.

Responsibilities:

Review and triage information security alerts, provide analysis, determine and track remediation, and escalate as appropriate.

Participate as a member of the Information Security Incident Response Team (ISIRT) by responding to information security incidents according to the Incident Response Plan.

Perform review of scheduled information security reports to identify abnormal or potentially suspicious activity within the environment.

Maintain the operational integrity of the Security Operations Center (SOC) through monitoring and periodic testing of critical tools and processes.

Develop working relationships with cross-functional teams from Information Technology, Physical Security, Human Resources, Marketing, Privacy, Legal, and third-party vendors to effectively respond to security incidents.

Document information security incident reports to capture relevant details including approach, root cause, lessons learned, and process improvements.

Contribute to the advancement of the security monitoring program through thought leadership and guidance on tools, technologies, and processes that provide automated and proactive detection and prevention.

Develop and improve process/procedure manuals and documentation related to incident response, threat intelligence, threat detection, and analysis of vulnerabilities.

Propose and generate metrics with emphasis on Security Operation Center (SOC) Key Performance Indicators (KPI).

Provide secondary support for the log management and Security Information and Event Monitoring (SIEM) solution.

Provide secondary support for the network security solution, including next generation fire walls and web proxies.

Qualifications:

Qualification Requirements: To perform this job successfully, an individual must be able to perform the Duties and Responsibilities (Duties) above satisfactorily and meet the requirements below.

The requirements listed below are representative of the minimum knowledge, skill, and/or ability required.

Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions of the job.

Education and/or Experience:

Required:

Minimum of seven years experience in an Information Security role with at least two years in an incident response, threat analysis, or security operation center role.

Bachelor's degree in Information Assurance, Information Systems, Computer Science or equivalent work experience; a M.S. in Information Security is preferred

Relevant knowledge and experience in two or more of the following areas: incident response, threat analysis, malware analysis, security operations, disk or memory forensics; next generation fire wall, proxy configuration and management

Demonstrated experience in threat detection technologies including two or more of the following: network or host intrusion prevention/detection systems (IPS/IDS), Endpoint
Protection, Security Incident Event Management (SIEM), data loss prevention (DLP)

Demonstrated ability to analyze security events, perform initial triage, and determine appropriate next steps

Demonstrated experience in security project development, security vendor or services management, and request for proposal processes and procedures

Preferred:

Certified Information Systems Security Professional (CISSP) or equivalent is preferred

One or more of the following technical certifications is preferred: GIAC Certified
Incident Handler (GCIH), GIAC Certified Forensics Analyst (GCFA), or GIAC Reverse
Engineering Malware (GREM), EC-Council Certified Security Analyst


Other Skills and Abilities:

In addition to the above, the following will also be required of the successful candidate:


Strong organizational skills

Strong attention to detail

Good judgment

Strong interpersonal communication skills

Strong analytical and problem solving skills

Able to work harmoniously and effectively with others

Able to preserve confidentiality and exercise discretion

Able to work under pressure

Able to manage multiple projects with competing deadlines and priorities


Information Architect
Information Technology

No Preference
FullTime Job
Other
1

Candidate Requirements
-
Bachelors

Walkin Information
-
-
-

Recruiter Details
Doug Klares
1350 Broadway, Suite 2205, NEW YORK-10018, NY, US
-