Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Truist Cyber DFIR Senior Engineer 
United States, Georgia, Atlanta 
971453378

08.09.2024

Regular or Temporary:

English (Required)

1st shift (United States of America)As DFIR professionals, individuals in this role demonstrate proficiency in log, code, cloud, identity, network, endpoint, memory, malware, and root cause analysis. The position will directly perform, facilitate, or consult on the entire cyber incident response.This role is office-centric (on-site) in downtown Atlanta, GA or Zebulon, NC with on-call responsibilities. 1st Shift (flexible, typically 7am to 4pm), Sunday to Thursday


Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Take ownership of a specific incident response focus area, develop plans, arrange meetings, and incrementally improve the monitoring and response capabilities in the assigned area.

  • Management of special projects, as assigned by management, requiring long-term time commitment and technical skills.

  • Strong oral and written communication skills, including ability to explain complex concepts in clear, unambiguous terms to a variety of audiences.

  • Applied expertise in malware analysis, reverse engineering, network forensics, cloud forensics, and/or advanced incident scoping across disparate environments.

  • Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.

  • Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation.

  • Perform real-time cyber incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, containment, eradication, and direct system remediation) tasks.

  • Coordinate and provide technical support to resolve cyber incidents.

  • Perform or help coordinate forensically sound collection of digital evidence and inspect to discern possible mitigation/remediation on enterprise systems.

  • Attend priority calls in support of IT-related outages.

  • Initiate and lead team chats, calls, and face to face settings.

  • Constantly improve runbooks, knowledge base entries, and various staff guides.

  • Drive improvements to automations, alert fidelity, and security controls.

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Bachelor’s degree in Computer Science, Computer Engineering, Cybersecurity, or related field of relevant education, certification, or related training.

  • Five years of experience in Cybersecurity or related work

  • Knowledge of one or more cloud platforms and cloud security

  • Knowledge of general information technology (IT) and cybersecurity

  • Knowledge of computer networking concepts and protocols, and network security methodologies.

  • Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).

  • Knowledge of operating systems, including Windows/Unix ports and services.

  • Knowledge of modern identity and access management concepts

  • Knowledge of phishing tactics and techniques

  • Knowledge of advanced cyber threats and vulnerabilities.

  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

  • Knowledge of adversarial tactics, techniques, and procedures

  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.

  • Knowledge of incident response and handling methodologies.

  • Knowledge of countermeasures to address a variety of threats

  • Knowledge around leveraging automation, ML, and/or AI

  • Knowledge of advanced threat hunting techniques

  • Knowledge of types of digital forensics data and how to recognize them.

  • Knowledge of types and collection of persistent data.

  • Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).

  • Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.

  • Knowledge of processes for seizing and preserving digital evidence.

Preferred Qualifications:

  • Experience working in cloud environments, namely Microsoft Azure and Amazon AWS.

  • Industry certifications in general technology (e.g. Network+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, etc.)

  • Industry certifications in cyber security, such as: Security+, CySA+, GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), GIAC Cloud Forensics Responder (GCFR), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensic Analyst (GNFA), GIAC Reverse Engineering Malware Certification (GREM), etc.

  • Experience in Cyber Breach Response, Security Operations Center (SOC), Network Operations Center (NOC), IT/Cyber Engineering, or Intelligence Community (IC)