Cyber Security Incident Response Team
Location: Pittsburgh
Job Type: Full Time / Permanent
The Cyber Security Incident Response Team (CSIRT) Member conducts essential cyber security incident handling activities. This is accomplished by conducting event and incident analysis and coordinating incident containment and remediation actions. In addition, the CISRT team member is instrumental in cyber threat and vulnerability analysis and response coordination. The jobholder will be responsible for interfacing with the Security Operations Center to receive alerts and determine appropriate action. Further, the CSIRT members shape detection criteria and consult on SOC operational guidelines. This role includes cybersecurity incident response across the enterprise. The jobholder has the authority to initiate the IT Security Incident Management Process, and to brief all levels of executive management on security topics and to execute emergency responses during cybersecurity breaches.
Major tasks and responsibilities: • Serve as a technical resource for cyber security incident handling • Provide qualified guidance on and coordinate execution of identification, analysis, response and monitoring of cyber threat and vulnerabilities • Monitor and consult on technical vulnerability remediation Incident Management and Monitoring • Manage Security incidents. • Assist in developing concepts for efficient and effective security response activities. • Be a trusted point of contact and expertise for incidents, and manage all the incident response activities including escalation to upper management. • Provide qualified guidance on SOC alerting conditions and necessary data sources. • Note: this role requires some on-call duty, with expected weekend responsibilities (once per 9 weeks) Vulnerability Management • Analyze and interpret results of vulnerability management activities using standard frameworks (CVSS) • Research and investigate new and emerging vulnerabilities, to include 0Day events • Identify and resolve false positive findings in assessment results • Assess compensating controls and validate their effectiveness • Partner with stakeholders to streamline, standardize and document vulnerability remediation procedures • Monitor vulnerability remediation activities • Integrate information from disparate sources and create tactical intelligence that is relevant to protecting the business. Threat Management • Research and investigate new and emerging cyber threats and vulnerabilities through participation in external security communities. • Manage relationships with global stakeholders to identify business needs and design appropriate security controls. • Analyze and interpret threat information using standard frameworks (Cyber Kill Chain, MITRE ATT&CK framework).
Minimum Qualifications: • Master’s degree in information assurance (or related field) with minimum 4 years’ experience in incident handling or B.S in Information security (or related field) with minimum of 6 years’ experience in incident handling • Experience with identifying, analyzing, and communicating cyber threat and vulnerability information • Experience applying threat and vulnerability analyses models, including the LM Cyber Kill Chain, the Diamond Model of Intrusion Analysis, the MITRE ATT&CK Framework and the Common Vulnerability Scoring System (CVSS).
Essential Skills: • Understanding of ITIL/ service management concepts • Expertise of security concepts and best practices related to incident management, threat and vulnerability management • Intercultural experience • Exemplary verbal and written communication skills (English business fluent spoken and written) • Demonstrated ability to think strategically and perform detailed, complex analysis and data interpretation • Effective interpersonal skills, out-of-the-box thinking and ability to interface with all levels of staff • Ability to work under pressure and deal with ambiguous situations • Ability to travel globally • Experience in a global corporation • Experience with incident response across a multi-provider cloud environment • SANS Certified Incident Handler, CERT-Certified Computer Security Incident Handler certification or equivalent • Familiarity with Splunk and the CrowdStrike Falcon platform.