Back to Job Search

Incident Detection Engineer

  • Location: Plano, Texas, 75024
  • Salary: 60.0
  • Job Type:Contract

Posted about 1 month ago

This international network integration leader has an immediate 6-12+ month contract opportunity in Plano, TX for an Incident Detection Engineer.  Will be working temporarily remote but must be willing to work onsite in Plano post-COVID.  The Incident Detection role helps security operations by responding to escalated alerts and monitoring alerts. This position conducts in-depth analysis of security events with the specific ability to identify Indicators of Compromise, perform intrusion scope and root cause analyses and implement triaging protocols to mitigate potential damage to our cyber ecosystem.

This position requires someone that is flexible and available for various shifts (day shift is: 6am to 6pm, night shift is: 6pm to 6am) in a 24/7 SOC operation, and that includes on weekends as well.  It will be 2 days off then 2-3 days on.  Day and night shift would rotate every few months.

RESPONSIBILITIES:

  • Conducts Event Detection, Incident Triage, Incident. Handling, Hunting activities by leveraging our detection/response platforms

  • Continuously monitors levels of service as well as interpret and prioritize threats through use of cyber threat intelligence, intrusion detection systems, firewalls and other boundary protection devices, and any security incident management products deployed

  • Provide 24x7 incident detection and monitoring service, and performance report on regular basis

  • Escalates cyber security events according to playbook and standard operation procedures (SOPs).

  • Remediate non-compliance with technical and security requirements.

  • Escalates high or critical severity level incidents to Incident Investigators.

  • Assists with containment of threats and remediation of environment during or after an incident

  • Performs triage of service requests from customers and internal teams

  • Develop and implement remediation plans in response to incidents

  • Updates procedures and configure tools for Monitoring Analysts consumption

  • Consumes threat intelligence and disseminate findings to relevant parties

  • Conducts hunting activities based on internal and external threat intelligence

  • Integration of additional supported log source/device and development of new use cases as required


MINIMUM QUALIFICATIONS:

  • 8+ years cyber security experience required

  • 3+ years of experience in incident response handling

  • BA/BS in Engineering, Computer Science, Information Security, or Information Systems or related work experience

  • 2+ years of experience using event escalation and reporting procedures, managing security alerts within enterprise SIEM systems, and performing network monitoring in a Cyber Security?Operations environment

  • Working knowledge of security technologies such as Active Directory, anti-malware tools, forensics tools, firewalls, identity access management, IDS / IPS, multi-factor authentication, network devices, SIEM, threat intelligence, vulnerability scanners, monitoring tools, and web filters on premise and in cloud environments required

  • Demonstrated analytical, problem-solving, and critical thinking skills required

  • Ability to work with little supervision and consistently deliver results required

  • Familiarity with network technologies and protocols (switches, routers, firewalls, VPNs, remote connection technologies, and multiple domain environments) strongly preferred


PREFFERED QUALIFICATIONS

  • Experience with Splunk and other SIEM platforms, Enterprise Intrusion Prevention Systems, Endpoint Detection tools, and other security products

  • Experience conducting incident handling and response efforts in large enterprise environments

  • Experience supporting incident investigations

  • Experience working in a 24/7 SOC environment

  • Security certifications (e.g. Security+, Network+, CEH, SANS etc.)