Pittsburgh PA
We are looking for a Junior Cybersecurity Analyst who is passionate about defensive security and progressing the cyber maturity of our clients. The ideal candidate will be an innovator who will need to dive deep into a large number of unknowns, using his or her security expertise to uncover problems within client environments and identify opportunities to increase the overall capabilities of the Schneider Downs cybersecurity practice. Our successful candidate will have the opportunity to engage with systems that are at the cutting edge of technology and scale. We are also looking for someone familiar with the incident response process who is capable of commanding critical incidents, engaging with senior leadership, developing other junior team members and leading our organization’s initiatives.What you will do Host/network based forensic investigationsDevelop custom reports based on data from multiple data sources, including security appliance, network sensors, and outside intelligence feedsPresent technical material in a clear, organized briefing to a mix of technical and non-technical personnelFully scope and present findings for a broad range of incidents from Nation state APT to financially motivated cyber-crime incidentsDevelop, document and manage a containment and remediation strategy for customersMaintain current knowledge of tools and best-practices in advanced persistent threats; tools, techniques, and procedures of attackers; and forensics and incident response
We are looking for a Junior Cybersecurity Analyst who is passionate about defensive security and progressing the cyber maturity of our clients. The ideal candidate will be an innovator who will need to dive deep into a large number of unknowns, using his or her security expertise to uncover problems within client environments and identify opportunities to increase the overall capabilities of the Schneider Downs cybersecurity practice.
Our successful candidate will have the opportunity to engage with systems that are at the cutting edge of technology and scale. We are also looking for someone familiar with the incident response process who is capable of commanding critical incidents, engaging with senior leadership, developing other junior team members and leading our organization’s initiatives.
What you will do
Qualifications
Support large-scale technical projects for clients, mainly incident analysis and forensicsExperience in an analytical role of either network forensics analyst, threat analyst, incident response or security engineer/ consultantCollaborate with team members on a global scale and serve as part of a global on-call rotationExperience conducting analysis of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operationsExperience with advanced computer exploitation methodologiesAbility to integrate data from multiple sources and present concise, relevant information to a non-technical audienceUnderstanding of the workings and analysis of TCP/IP network communication protocolsPractical working knowledge of the incident response lifecycle (detection, Identification, containment, analysis, remediation and reporting)Develop detailed reports on root cause analysis and recommendations related to computer incidentsStrong communication and presentation skills, along with the ability to work in a highly collaborative environmentRelated certifications a plus (GCIH, GCFE, GCFA, GREM, GNFA, A+, Network+, and/or Security+)Basic understanding of legal, regulatory and compliance requirements (GDPR, PCI, HIPAA, SOX, etc.)Background Bachelor’s DegreeWe Value Knowledge or Experience in the Following Areas Incident Commanding / ResponseNetwork and Host ForensicsOperating Systems (Windows, Linux, MacOS)Automation (e.g., Python, Shell, PowerShell)Windows / Unix / Mac / Network Log AnalysisPresentations to executive leadershipTechnical training / mentoring of othersSIEM deployment or managementEDR solutionsForensic recovery of evidenceMalware analysisStrong firewall and networking backgroundWindows administration knowledge to include:GPO configurationsServer and workstation hardeningBackups; system recoverySensitive registry hive valuesNetwork traffic analysisKnowledge about a what an effective security architecture entails
Background
We Value Knowledge or Experience in the Following Areas
Email this Job Ad to your friend(s) by adding their email address(es) along with your details to the field below: *Separate each recipient email address with a comma.
Recipient email address(es):
Your First Name:
Your Last Name:
Select which language the email should be sent in.