IT Security Incident Response Handler (SOC)
Recruiter
Listed on
Location
Salary/Rate
Salary Notes
Type
Start Date
This job has now expired please search on the home page to find live IT Jobs.
IT Security Incident Response Handler (SOC) - 6 Months Contract - Port Sunlight (Merseyside)
IT Security Incident Response Handler (SOC) required to join a reputable manufacturer of Fast Moving Consumer Goods located in Port Sunlight on a 6 month contract.
The role:
You will be working within the Computer Security Incident Response Team and will also be responsible for responding to Web and Non Web related Incidents.
Responsibilities:
* Responsible for analysis of IT and Web related security incidents reported to the SOC.
* Perform investigation and closed loop management of cyber security incidents with IT and business unit teams and leadership
* Brief SOC management on activities related to cyber incident response and remediation.
* Create, manage, and dispatch incident tickets.
* Participate in or lead root cause analysis or lessons learned sessions.
* Write technical articles for knowledge sharing.
* Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams.
* Responsible to mine for open data sources to identify potential cyber threats, targets of interest, and timeframes for attack.
Required Skills:
* Minimum of 3 years of Incident response experience is required; with overall 8 years of experience.
* Global operational SOC exposure is required.
* Broad understanding of Information Security with relevant work experience and/or relevant certifications.
* Solid understanding of common cyber threats, penetration/intrusion techniques and attack vectors.
* In-depth experience in security incident management processes and tools technology experience, including troubleshooting and performing root cause analysis of complex IT solutions
* Two or more years of demonstrated leadership experience building consensus across IT domains
* Two or more years of demonstrated experience managing a high-performing, cohesive security response team
* Two or more years of demonstrated experience in liaising with middle and senior management of a large commercial enterprise
* Experience handling Web application Security incidents.
* Experience in handling data loss incidents.
* Experience in handling malware outbreak incidents.
* Ability to learn and operate in a dynamic environment.
* Ability to demonstrate analytical expertise, pay strict attention to detail, demonstrate excellent critical thinking, logic, and solution orientation, and to learn and adapt quickly
* Experience managing multiple priorities in a high pressure environment
* Effective communication skills (both written and verbal).
* Ability to work in a shift environment.
* Ability to be on-call on a recurring basis.
Key Skills:
* SANS GIAC GGCIH/GCFA, CEH, or CISSP certification(s) preferred.
* Experience with any scripting language like PERL, PYTHON, SHELL or POWER SHELL.
* Experience with automation using scripting languages.