• NSD International
  • $75,665.00 -170,270.00/year*
  • Jersey City , NJ
  • Information Technology
  • Full-Time
  • 10 Bayside Terrace

Loading some great jobs for you...

Job Description
Title: Security Operations Center (SOC) Incident Responder
Your Role:

Do you have a knack for information security? Are you at your best when you need to analyze information security related incidents? We re looking for someone like that to:

Analyze malware samples to understands its behavior, assess threat actor motivations, and extract indicators of compromise (IOCs)
Act upon threat intelligence provided by Cyber Threat Intelligence function
Respond to Information Security related queries
Perform cyber threat hunting for the detection of advanced threats
Mentor and train junior analysts to enhance the overall technical skillset of the SOC, establish analytic discipline and critical thinking, and promote greater curiosity thinking \"outside the box\"
Expand, tune, and enhance rulesets SIEM, IDS, etc. to identify security incidents and reduce false positives
Investigate IOCs provided by Cyber Threat Intelligence or the Cyber Hunter function
Handling incidents encompassing multiple functions: detection and identification, incident triage, network and host-based forensic analysis, root-cause analysis, containment, system hardening, etc.
You ll be working in the security operations center team in Weehawken


A natural ability to solve complex issues through analytical and lateral thinking
Performed proactive hunting; have detected anomalous and potentially malicious activity in log data
Master's degree in a STEM field with 3+ years of relevant experience; Bachelor's degree in a STEM field with 5+ years of relevant experience; or 9+ years of incident response, malware analysis, and threat detection
Hands-on experience with content development and use-case management
Proficiency in log parsing and data analysis (REGEX is a must)
Proficiency in x86 assembly language, disassemblers, and debuggers
Hands-on experience with Volatility or similar malware analysis/forensic tools
Proficiency in static and dynamic malware analysis
Demonstrable proficiency in code de-obfuscation and anti-forensic techniques
Fluency in at least one compiled language (C, C++, etc.) and one scripting language (Python, Perl, etc.)
A firm understanding of the TCP/IP stack and networking (knowing the difference TCP and UDP is not enough)
Moderate to advanced understanding of DDoS attacks and mitigation techniques

Company Description
About The Rockridge Group:

TRG is a privately held Limited Liability Company committed to connecting businesses with job seekers. We deliver high quality contingent personnel to our clients using our 3-step collaborative engagement model:
Collaborate. We partner with you to understand the unique needs of your business before we propose a solution.
Strategize. Based on your goals and staffing challenges, we develop high impact solutions designed for your industry.
Engage. We work with your team before, during, and after every engagement to deliver 100% satisfaction.
With over ten (10) years experience in the resource solutions sector, principals Greg Donner [link to bio] and Ronald Lom [link to bio] leverage the power of strategic partnership to create a powerful staffing model that improves your quality of hire.
Associated topics: attack, forensic, information assurance, information security, information technology security, protect, security, security analyst, threat, violation

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.

Launch your career - Upload your resume now!

Upload your resume

Loading some great jobs for you...