Pondurance · 3 days ago
Senior Security Analyst
Wonder how qualified you are to the job?
Cloud SecurityCompliance
Insider Connection @Pondurance
Responsibilities
Seek out attacker presence with advanced threat hunting.
Mentor, guide, and act as an escalation point for Security Analysts (Tier 1 & 2)
Support the internal Vulnerability Management Program (VMP)
Create, update, and participate in crafting playbook responses, and other Standard Operating Procedure (SOP) documentation.
Identify and confirm attack vectors, threat tactics and attacker techniques.
Proactively engage with clients to understand their security needs and wants.
Regularly review Threat Intelligence reports and provide actionable hunts based on observed and reported threats.
Work with the team to resolve issues, tweak current processes, and develop/improve existing work instructions.
Analyze, identify, and develop countermeasures to Indicator of Compromises (IOCs)
Lead security investigations to closure.
Review alerts and make recommendations to tune out False Positives (FP)
Work on projects related to SOC improvements and enhancements.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Advanced knowledge of Intrusion Detection System (IDS) / Intrusion Prevention System (IPS) tools and applications
Demonstrated experience with Packet Capture (PCAP) analysis using Wireshark, familiarity with commercial or open source log or SIEM solutions, event analysis, correlation, reporting and alerting, reverse engineering malware and host-based analysis/detection, service discovery tools such as nmap, vulnerability scanning tools such as Nessus, Nexpose, and/or Qualys
Experience with system or network administration (Unix/Linux experience preferred)
Experience and knowledge of information security, IPv4/v6 networks, network devices, proxies, IDS/IPS, and monitoring tool
Endpoint, Detection, and Response (EDR) solution experience (FireEye, SentinelOne, Crowdstrike for example)
Extensive experience in I.T. and Information Security
Continuous growth progress within Cybersecurity/Information technology field by accumulating certifications, degrees, and/or CPEs
Email phishing detection/analysis experience at an intermediate to advanced level
Proven success supporting incident response and investigations
Significant experience creating and editing documentation
Intermediate to advanced level log analysis and review skills.
Preferred
GCIH, GCFA, CISSP or equivalent certification/experience
Analytical Thinking: Break down the fundamental components of a problem or situation, examine the relationship between them, verify all pertinent facts and draw an appropriate conclusion
Applied Technical Thinking: Able to apply specialized, theoretical knowledge to efficient operational uses
Flexibility: Operate efficiently in constantly evolving environments and, when confronted with unforeseen circumstances, readjust priorities to accommodate change
Problem Solving: Able to identify problems, determine cause and effect, and propose solutions using new approaches or an innovative point of view
Sense of Urgency: Be prone to react quickly to outside demands, get onto things right away and get things done fast
Benefits
Medical
Dental
Vision
Disability
FSA
HSA
Life and AD&D insurance
401(k) Plan
Company
Pondurance
Pondurance is cybersecurity company that focuses on delivering both technology-enabled and compliance-advisory solutions.
Funding
Current Stage
Growth StageTotal Funding
unknownKey Investors
Newlight Partners
2020-10-27Private Equity· Undisclosed
Recent News
Company data provided by crunchbase