Cyber SOC Analyst – Sr. Incident Responder
Internship USA IT development
Job description
3479876
Additional Cities
United States (Role Can Be Remote)
Career Level
Experienced
Relocation Assistance
No
Business
GE Healthcare
Business Segment
Healthcare Digital Technology
Function
Digital Technology
Country/Territory
United States
Additional States/Provinces
Alabama, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, District of Columbia, Florida, Georgia, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Northern Mariana Islands, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming
Role Summary/Purpose
The Senior Incident Responder will be part of a dynamic, growing team, planning, preparing, hunting for, and responding to cyber incidents stemming from internal and external threat actors. Demonstration of leadership abilities in a large corporate environment as well as a strong comprehension of malware, emerging threats and calculating risk will be critical to success. Finally, this role requires the ability to work with minimal direction from Incident Response and company leadership.
Essential Responsibilities
A Cyber Secure Operations Center (SOC) Analyst, who will be part of a dynamic, growing team, responsible for the remote provisioning of cyber security technologies, monitoring, and responding to cyber security events occurring in customers’ production environments.
As a SOC Analyst, individual is expected to work in an intense, 24×7 operational environment focused on monitoring, alerting and remediation of identified cyber security issues, potentially targeting clinical medical devices or customers’ enterprise IT computing environments.
In addition to real-time threats, SOC Analysts must be able to research, document, and report on emerging cyber security trends facing healthcare industries worldwide.
A SOC Analyst must be able to demonstrate strong leadership abilities in a large corporate environment, as well as able to understand and convey technical risk aspects to different audiences.
This role requires the ability to work with minimal direction and company leadership.
· The best candidates for the role work well with other teammates, and must be able to demonstrate decision making skills to handle the often fast-paced role of a SOC Analyst
· Perform daily customer network/system monitoring and response operations
· Configure/tune cyber security monitoring systems/tools, and develop scripts and correlation rules
· Strong verbal and written communication skills
Qualifications/Requirements
· 4-year degree in Computer Science or a related technical degree
· 1+ years’ of experience detecting and remediating cyber security issues in a Clinical Operations Technology environment.
· 1+ years' experience as a Security/Network/System Administrator or equivalent knowledge.
· In-depth knowledge of various operating systems (Microsoft Windows, Linux, Mac OS, Android, etc.)
· In-depth knowledge of TCP/IP Protocols, Network analysis, Packet capture, Routing/Switching, Network segmentation, Network/System/Host level operating principals and security controls.
· Working knowledge of various relational database technologies (Microsoft SQL, MySQL, Oracle, etc.)
· Working knowledge of various security methodologies, processes, and technical security solutions (e.g. Firewalls, Intrusion Detection/Prevention systems, Access Control Lists, Network Segmentation, SIEMs, Auditing/Logging and Identity & Access Management solutions, etc.).
· General knowledge of cloud based technologies and cloud security architecture basics.
· Network+, Security+, CEH or related SANS, or vendor specific (e.g. CISCO, Microsoft, RedHat, AWS, etc.) certifications preferred.
· Legal authorization to work in United States. is required. We will not sponsor individuals for employment visas, now or in the future, for this job
· Any offer of employment is conditioned upon the successful completion of a background investigation and drug screen
· Must be willing to travel 5-10%
Desired Characteristics
•
· The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler
· Strong verbal and written communication skills
· Detailed understanding of APT, Cyber Crime and other associated tactics
· Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry
· Knowledge of and/or working on GE OT products
· Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology
· Experience with host based detection and prevention suites (McAfee EPO, OSSEC, Yara, MIR, CarbonBlack, Tanium, etc.)
· Experience with host-centric tools for forensic collection and analysis (SleuthKit, Volatility Framework, FTK, Encase, etc.)
· Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis)
· Experience with malware and reverse engineering (Dynamic and static analysis)
· Strong IT infrastructure background including familiarity with the following:
· Networking (TCP/IP, UDP, Routing)
· Applications (HTTP, SMTP, DNS, FTP, SSH, etc.)
· Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.)
· System/Application vulnerabilities and exploitation
· Operating systems (Windows, *Nix, and Mac)
· Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques
· CISSP, CISM or related SANs certifications preferred
· Active US government security clearance
· Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG
About Us
GE (NYSE:GE) drives the world forward by tackling its biggest challenges. By combining world-class engineering with software and analytics, GE helps the world work more efficiently, reliably, and safely. GE people are global, diverse and dedicated, operating with the highest integrity and passion to fulfill GE’s mission and deliver for our customers. www.ge.com
GE offers a great work environment, professional development, challenging careers, and competitive compensation. GE is anEqual Opportunity Employer . Employment decisions are made without regard to race, color, religion, national or ethnic origin, gender (including pregnancy), sexual orientation, gender identity or expression, age, disability, veteran status or any other characteristics protected by law.
Additional Eligibility Qualifications
GE will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable).
Primary Country
United States
Primary State/Province
Wisconsin