Incident Response Analystother related Employment listings - Los Angeles, CA at Geebo

Incident Response Analyst

The University of Southern California (USC) department of Information Technology Services (ITS) is seeking an Incident Response Analyst with an exceptional commitment to service excellence to join its team. As the Incident Response Analyst, you will be an integral member of the Information Technology Services unit, collaborating with diverse and talented team members to help solve multidimensional information technology problems, improve customer experience, and generate value for our campus stakeholders across a broad base of departments and constituencies. THE WORK YOU WILL DO The Incident Response Analyst is the second level of inquiry of security events, communicating directly and escalating throughout incidents. The analyst hunts for suspicious activity, reviews the Security Operations Center team's work and false positives, and provides feedback to improve alert accuracy. They will also analyze log files and take an active part in containing issues, even after escalating when necessary. The Incident Response Analyst Provides second level of investigation of security events, producing vulnerability, configuration and coverage metrics. Analyzes log files and, working with SOC teams, investigates, compiles relevant technical and background information, and performs forensics and post-mortem analysis of information security and incidents. Communicates directly with data asset owners and business response plan owners throughout incidents and high-security events, per the IR guidelines, escalating issues when necessary and protecting the confidentiality, integrity and information owned or entrusted by the university. Hunts for suspicious, anomalous activity based on data alerts and outputs from various toolsets, and reports and summarizes findings to facilitate remediation tasks. Reviews and takes a proactive approach to false positives, and works with the various SOC teams to tune and provide feedback to improve accuracy of the alerts. Takes an active part in the containment of events of interest, even after escalations. Applies critical thinking and risk analysis methodologies when considering evaluating impact of vulnerabilities, relative risks, and any possible solutions. Prepares reports and conducts briefings on significant investigations. Maintains awareness and knowledge of current changes within legal, regulatory, and technology environments which may affect operations. Ensures senior management and staff are informed of any changes and updates in a timely manner. Establishes and maintains appropriate network of professional contacts. Maintains membership in appropriate professional organizations and publications. Attends meetings, seminars and conferences and maintains continuity of any required or desirable certifications, if applicable. Performs other related duties as assigned or requested. The university reserves the right to add or change duties at any time. PREFERRED QUALIFICATIONS The ideal candidate for the position of Incident Response Analyst has the following
Qualifications:
Three years or more years of experience in information security and two years' experience as an SOC analyst, including one year as a level-two response analyst. CCNA certification and/or Security Essentials - SEC401 (optional GSEC certification) or similar. Associate's Degree with focus in Cybersecurity or equivalent experience. MINIMUM QUALIFICATIONS Candidates for the position of Incident Response Analyst must meet the following
Qualifications:
Bachelor's degree or combined experience/education as substitute for minimum education 3 years of experience Knowledge of network security zones, firewalls, and IDS. Knowledge of log formats for syslog, http logs, DB logs and how to gather forensics for traceability back to event. Knowledge of packet capture and analysis. Experience with log management or security information management tools. Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat). Ability to make information security risk determinations. Effective verbal and written communication skills. THE ITS TEAM The ITS vision aligns strategy, business, and services; affirms ITS cultural values; empowers cross-functional teamwork; embraces world-class best practices; and promotes innovation, excellence, agility, and efficiency. To achieve this vision, ITS is committed to providing a modern technology infrastructure that is resilient and delivers the performance necessary to meet the demands of a growing customer base, training in the latest technologies for its highly productive and motivated workforce, outstanding customer experience, and technology services that are aligned with the university's mission to provide exceptional learning opportunities for students. ITS is creating a workplace where employees can develop cutting-edge skills, take pride in the services they provide, and have access to the roles and career paths that align to their abilities and potential. We are looking for top talent to join us on our journey. ITS CULTURE USC's ITS organization represents a diverse and talented team, committed to supporting a collaborative culture and delivering secure and innovative IT services that are core to the mission of the university. We are also committed to creating and maintaining meaningful partnerships across the university. At ITS, we act with integrity in the pursuit of excellence; embrace diversity, equity and inclusion; promote well-being; engage in open two-way communication and are accountable for living our values. ITS strives for a supportive and inclusive culture that encourages employees to do their best work every day and where individuals are recognized and celebrated for their contributions. ABOUT USC USC is the leading private research university in Los Angeles--a global center for arts, technology, and international business. With more than 47,500 students, we are located primarily in Los Angeles but also in various US and global satellite locations. As the largest private employer in Los Angeles, responsible for $8 billion annually in economic activity in the region, we offer the opportunity to work in a dynamic and diverse environment, in careers that span a broad spectrum of talents and skills across a variety of academic and professional schools and administrative units. As a USC employee and member of the Trojan Family--the faculty, staff, students, and alumni who make USC a great place to work--you will enjoy excellent benefits, including a variety of well-being programs designed to help individuals achieve work-life balance. USC values diversity and is committed to equal opportunity in employment. Come join the USC ITS team and work as a trusted partner in shaping an environment of innovation and excellence. Apply today! Minimum Education:
Bachelor's degree; Combined experience/education as substitute for minimum education Minimum
Experience:
3 years Minimum Field of Expertise:
Knowledge of network security zones, firewalls, and IDS. Knowledge of log formats for syslog, http logs, DB logs and how to gather forensics for traceability back to event. Knowledge of packet capture and analysis. Experience with log management or security information management tools. Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat). Ability to make information security risk determinations. Effective verbal and written communication skills.
Salary Range:
$80K -- $100K
Minimum Qualification
Business Intelligence & AnalyticsEstimated Salary: $20 to $28 per hour based on qualifications.

  • Type: Other
  • Company: University of Southern California

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.