Qualifications:
• Bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or a related field.
• Minimum three (3) years of professional experience in incident detection and response, malware analysis, or digital forensics.
• Must have at least one (1) of the following certifications:
• SANS GIAC: GCED, GCIA, GPEN, GWAPT, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON, GCIH
• ISC2: CCFP, CCSP, CISSP
• Cisco: CCNA, CCNP
• CERT: CSIH
• EC Council: CEH, ENSA, CNDA, ECSS, ECSP, ECES, CHFI, LPT, ECSA, or ECIH
• Offensive Security: OSCP, OSCE, OSWP and OSEE
• Digital Forensics: EnCE, CB, MiCFE, ACE, GCFA, GCFE
In addition, a minimum of one (1) year of specialized experience in one or more of the following areas:
• Security Assessment or Offensive Security
• Application Security
• Security Operations Center/Security Incident Response
• Cyber intelligence Analysis
At Client, your work makes a difference. We believe that we can build a better form of commerce that is enabled by people, supported by technology, and open to everyone—creating more opportunity for all. The client is seeking a CSIRT Engineer to join our highly visible Cyber Security Incident Response Team that provides Security Operations Center (SOC) support, cyber analysis, scripting and automation, and a 24x7x365 support staff. This specific position requires the ability to work swing and/or graveyard shifts with rotations into day shifts. Working within the Client Computer Security Incident Response Team (CSIRT), you will have the opportunity to build innovative solutions to identify and mitigate information-security threats. You will work collaboratively to creatively solve complex security problems in a heterogeneous environment. With your contributions, we’re building the best security incident response team in the industry. Your skills, vision, tenacity, and passion will help us defend and respond daily to keep client critical information assets away from threats and hackers. Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, and extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices. Must demonstrate expert knowledge in one (1) or more of the following areas: Incident Response, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis
Core Job functions include:
• Investigations—Investigating computer and information security incidents to determine extent of compromise to information and automated information systems
• Escalations—Responding to escalated events from security tooling to develop/execute security controls and defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce, and web-based systems.
• Research—researching attempted or successful efforts to compromise systems security and designing countermeasures.
• Education - maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, and network security and encryption.
• CoCommunications—provides information and updates to shift leads & leadership, creates pass-downs for the next shift, works closely with supporting teams, provides feedback for new security policies and standards, and engages with other teams and adjacencies through email and conference calls.
• Digital Forensics—As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country law
• Coverage—Must be willing to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10-hour shifts with four days on, three (3) days off, and possible rotations across day, swing, and graveyard shifts as needed.
To be successful in this position, you should be proficient with:
• Incident Response—Getting people to do the right thing in the middle of an investigation.
• Offensive Techniques—Penetration testing, IOCs, and exploits at all layers of the stack.
• Logs - you should be comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats.
• System Forensics—Basic understanding of image acquisition techniques, memory forensics, and the like.
• Networking Fundamentals - TCP/IP Protocols (HTTP, DNS, FTP, DHCP, ARP, etc.) and Wireshark/TCPDump.
• Scripting—should be familiar with scripting in at least one of the following: Python, Perl, or a similar language.
• Risk Analysis—Taking a vulnerability in a particular environment and understanding the practical associated risk.
- **Only those lawfully authorized to work in the designated country associated with the position will be considered.**
- **Please note that all Position start dates and duration are estimates and may be reduced or lengthened based upon a client’s business needs and requirements.**
Each time I contacted Rose, I was completely satisfied with the great attention and customer service I received. Each person was extremely knowledgeable and patient with my concerns or questions.
Diana, Consultant
I had a very positive experience working for Rose. The entire process is very efficient and easy.
Joanne, Consultant
I have been very pleased with my experience with Rose International. Everyone that I encountered was very helpful and courteous.
Stephanie, Consultant
Your team at Rose International is always very helpful and responsive.
Barbara, Consultant
It was great working for Rose International. Everyone was extremely helpful.
Rosann, Consultant
EMPLOYEE COMMENTS