Home  Post Resume Quick IT Job Search  Advanced IT Job Search 
Skip Navigation LinksHome » Job Details
eTouch Systems Corp.
  Company Profile
eTouch Systems delivers content-centric business solutions and services to help business and organizations of any size unlock the value of their information and turn it to competitive advantage. We offer comprehensive and powerful portfolio of products, solutions, and services that makes it easy for employees, customers, and partners to contribute, collaborate, and communicate with impact. Our mission is to provide solutions and services that offer compelling value and deliver real business benefits.
 
  Job Details 
Title: 

IT Security Analyst : Fremont, CA

Posted On:  11/17/2016 11:12:28 PM
Designation: 

IT Security Analyst

Qualifications:  Bachelor Degree
Essential Skills: 
Not specified
Job Tenure:  No Preference/Any
Salary Offered:  DOE
Job Location:  Fremont CA United States

  Job Description
Required:
•Bachelor's degree in Computer Science or related field, or equivalent work experience
•Formal IT Security/Network Certification such as SANS GIAC Certified Intrusion Analyst (GCIA) or SANS GIAC Network Forensic Analyst (GNFA) or SANS GIAC Continuous Monitoring (GMON) or related Degree
•6 years of Information Technology experience, with at least 4 years of experience in information security working within security operations
•Security Operations Center (SOC) experience
•Deep knowledge of log, network, and system forensic investigation techniques
•Deep knowledge of diverse operating systems, networking protocols, and systems administration
•Deep knowledge of commercial forensic tools
•Deep knowledge of common indicators of compromise and of methods for detecting these incidents
•Deep knowledge of IT core infrastructure and cyber security components/devices
•Deep knowledge of TCP/IP Networking and knowledge of the OSI model
•Deep knowledge of OS management and Network Devices
•Deep knowledge of Intrusion Detection/Prevention Systems
•Deep knowledge of Antivirus Systems
•Intelligence driven defense utilizing the Cyber Kill Chain
•Significant experience monitoring threats via a SIEM console
•Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
•Excellent problem solving, critical thinking, and analytical skills - ability to de-construct problems
•Strong customer service skills and decision-making skills
•Significant experience with packet analysis (Wireshark) and Malware analysis preferred
•Working knowledge of PGandE infrastructure preferred
•IBM QRadar and Dell SecureWorks experience preferred
•Candidate must have familiarity with regulatory requirements, such as NERC/CIP, NIST SP 800, SOX, etc

Desired:
•Utility Industry experience
•Experience with scripting in Perl/Python/Ruby/PowerShell
•Experience with network and desktop-based and server-based forensics
•Malware reverse engineering skills Personal Attributes:
•Strong sense of professionalism and ethics.
•Acts with integrity and communicates honestly and openly
•Ability to build rapport and cooperation among teams and internal stakeholders
• Respects others and demonstrates fair treatment to all
•Methodical and detail oriented
• Self motivated, Actively seeks to enhance the group through the sharing of knowledge

  Contact Information
Reference Name (If Any): 





 
Terms and Conditions | Privacy Policy | FAQ | Contact Us | Why?? | Link to us