Incident Response Analyst V2X

Employer Active

Posted 2 hrs ago

Experience

5 - 7 Years

Job Location

Kuwait - Kuwait

Education

Any Graduation

Nationality

Any Nationality

Gender

Not Mentioned

Vacancy

1 Vacancy

Job Description

Roles & Responsibilities

Monitor security alerts and logs from various sources to promptly detect and triage potential security incidents, prioritizing based on severity and impact.

Conduct in-depth investigations into security incidents, employing digital forensics techniques and tools to analyze evidence, identify root causes, and determine the extent of compromise.

Take immediate action to contain security incidents, prevent further unauthorized access, and eradicate malicious activity from affected systems and networks.

Perform forensic analysis on compromised systems, networks, and digital artifacts to gather evidence, reconstruct events, and support incident response efforts.

Proactively search for indicators of compromise (IOCs), anomalous behavior, and emerging threats within organizational environments to detect and mitigate potential security breaches.

Collaborate closely with cross-functional teams, including IT, security operations, legal, and senior management, to coordinate incident response activities and communicate effectively throughout the incident lifecycle.

Prepare detailed incident reports documenting findings, actions taken, and lessons learned from security incidents for internal stakeholders, regulatory compliance, and potential legal proceedings.

Conduct post-incident analysis and lessons learned sessions to identify areas for improvement in incident response processes, procedures, and controls.

Stay abreast of the latest cyber threats, attack techniques, and security technologies through ongoing training, knowledge sharing, and participation in industry forums and communities.

Ensure compliance with relevant regulatory requirements, industry standards, and organizational policies related to incident response, data protection, and cybersecurity.

Perform trend analysis on events and incidents to identify and characterize threats.

Conduct open-source research to identify commercial exploits or vulnerabilities, including Zero-Day threats, necessitating prompt response actions.

Prepare comprehensive formal reports and presentations tailored for both technical and executive audiences.

Configure and optimize software and hardware-based detection and prevention mechanisms.

Assist in Computer Defense Assistance Program (CDAP) missions as requested by clients.

Stay abreast of the latest cybersecurity threats, technologies, and best practices.

Collaborate with cross-functional teams to elevate the overall cybersecurity posture.

Maintain current knowledge of relevant compliance requirements and ensure adherence.

Mentor and provide guidance to junior team members.

Collaborate with external organizations and agencies to share threat intelligence and enhance collective cybersecurity capabilities.

Performs other duties and assignments as required.

Desired Candidate Profile

Qualifications

  • Security Clearance:
    • Requires an active Top Secret Clearance with SCI
  • Education / Certifications: One year of related experience may be substituted for one year of education if degree is required.
    • Associate s degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
    • This position requires candidates to adhere to DoD 8570.01M.
    • All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline Environment (BE) certifications cannot also be used as a Computing Environment (CE) certification.
    • The authorized certifications for this job title are listed as follows:
  • BASELINE:
    • Cisco: CyberOps Professional
    • Cisco: CCNA: Certified Network Associate - Security
    • CompTIA: Cloud+ ce
    • CompTIA: CySA+ ce: Cybersecurity Analyst
    • CompTIA: PenTest+
    • CyberSec: CFR: First Responder
    • EC-Council: CEH: Certified Ethical Hacker
    • EC-Council: CHFI: Certified Hacking Forensic Investigator
    • GIAC: GCFA: Certified Forensic Analyst: Certified Forensic Analyst
    • GIAC: GCIA: Certified Intrusion Analyst
    • GIAC: GCIH: Certified Incident Handler (Cannot be used as a dual qualifier)
    • GIAC: GICSP: Industrial Cyber Security Professional
  • COMPUTING ENVIRONMENT (CE):
    • EC Council: CIH: Certified Incident Handler
    • GIAC: GCFA: Certified Forensic Analyst
    • GIAC: GCIA: Certified Intrusion Analyst
    • GIAC: GCIH: Certified Incident Handler (Preferred) (Cannot be used as a dual qualifier)
    • GIAC: GCWN: Certified Windows Security Administrator
    • GIAC: GDAT: Defending Advanced Threats
    • GIAC: GREM: Reverse Engineering Malware
    • GIAC: GSEC: Security Essentials
    • Offensive Security: Certified Expert
    • Offensive Security: Certified Professional
  • Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Business Information Systems discipline for three years general experience.
    • At least five (5) years of practical experience working with various data (network and system) technologies, with a minimum of two of those years focused on information systems security, cyber threats and SIEM event analysis.
    • Experience with a customer service-oriented company.
  • Skills & Technology Used:
    • Ability to troubleshoot servers and infrastructure equipment.
    • Ability to assess networking requirements and provide solutions.
    • Ability to make accurate and independent decisions under pressure.
    • Ability to perform comfortably in a fast-paced, deadline-oriented work environment.
    • Ability to successfully execute many complex tasks simultaneously.
    • Visualization of quantitative (numerical) or qualitative information.
    • Excellent interpersonal, organizational, written, verbal communication, and briefing skills.
    • Excellent analytical and problem-solving skills.
    • Threat Intelligence and visualization technologies.
    • Security enclave engineering.

Company Industry

Department / Functional Area

Keywords

  • Incident Response Analyst

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

Similar Jobs

Security Analyst

Security Analyst

Business Analyst

Senior Cybersecurity Assurance Analyst

View All