Overview
On Site
$Based in experience
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 1 month(s)
Skills
IT Consulting
Agile
Real-time
SAP BASIS
IT Security
CSIRT
Information Security
Security Controls
Electronic Commerce
Research
System Security
Network Security
Encryption
Leadership
PASS
Security Policy
Information Systems
Legal
Law
Swing
Penetration Testing
SEIM
Acquisition
Forensics
Computer Networking
TCP/IP
HTTP
DNS
Dragon NaturallySpeaking
FTP
DHCP
Wireshark
Tcpdump
Scripting
Python
Perl
Risk Analysis
Computer Science
Information Technology
Malware Analysis
SANS
GCIA
GPEN
GCIH
CISSP
Cisco
Cisco Certifications
Certified Ethical Hacker
CHFI
ECSA
OSCP
Digital Forensics
GCFA
Security Analysis
Software Security
Security Operations
Incident Management
Cyber Security
Job Details
Stellar Consulting Solutions is a boutique business & technology consulting company headquartered in Atlanta, GA. We deliver high quality, agile, and experienced workforce for niche technology projects of any scale. We help forward thinking clients to solve specific problems by understanding their needs and align talent that can move fluidly
to match skill supply and demand on a real-time basis.
to match skill supply and demand on a real-time basis.
Stellar Consulting has a unique combination of technical and digital skills to recruit, engage, and retain qualified talent. We have a stellar reputation for striving to achieve high ethical standards. Our use of Innovative techniques and industry best practices has made us one of the fastest growing boutique firms delivering to enterprise business.
Description:
Computer Security Incident Response Team (CSIRT) you will have the opportunity to build innovative solutions to identify and mitigate information-security threats. You will work collaboratively to creatively solve complex security problems in a heterogeneous environment. With your contributions, we're building the best security incident response team in the industry. Your skills, vision, tenacity, and passion will help us defend and respond daily to keep eBay's critical information assets away from threats and hackers.
Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices.
Must demonstrate expert knowledge in one (1) or more of the following areas:
Incident Response, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis
Core Job Functions Include:
Investigations Investigating computer and information security incidents to determine extent of compromise to information and automated information systems
Escalations Responding to escalated events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems.
Research Researching attempted or successful efforts to compromise systems security and designs countermeasures.
Education - maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
Communications Provides information and updates to shift leads & leadership, creates pass-downs for next shift, work closely with supporting teams, provide feedback for new security policy and standards, engage with other teams and adjacencies through email and conference calls.
Digital Forensics As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country law
Coverage Must be willing to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10 hour shifts with four days on, three (3) days off and possible rotations across Day, Swing, and Graveyard shifts as needed.
To be successful in this position, you should be proficient with:
Incident Response Getting people to do the right thing in the middle of an investigation.
Offensive Techniques Penetration testing, IOCs, and exploits at all layers of the stack.
Logs - you should be comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats.
System Forensics Basic understanding of image acquisition techniques, memory forensics, and the like.
Networking Fundamentals - TCP/IP Protocols (HTTP, DNS, FTP, DHCP, ARP, etc.), and Wireshark/TCPDump.
Scripting Should be familiar with scripting in at least one of the following: python, perl or a similar language.
Risk Analysis Taking a vulnerability in a particular environment and understanding the practical associated risk.
Qualifications:
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or a related field.
Minimum three (3) years of professional experience in incident detection and response, malware analysis, or digital forensics.
Must have at least one (1) of the following certifications:
SANS GIAC: GCED, GCIA, GPEN, GWAPT, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON, GCIH
ISC2: CCFP, CCSP, CISSP
Cisco: CCNA, CCNP
CERT: CSIH
EC Council: CEH, ENSA, CNDA, ECSS, ECSP, ECES, CHFI, LPT, ECSA, or ECIH
Offensive Security: OSCP, OSCE, OSWP and OSEE
Digital Forensics: EnCE, CB, MiCFE, ACE, GCFA, GCFE
In addition, a minimum of one (1) year of specialized experience in one or more of the following areas:
Security Assessment or Offensive Security
Application Security
Security Operations Center/Security Incident Response
Cyber intelligence Analysis
At your work makes a difference. We believe that we can build a better form of commerce that is enabled by people, supported by technology, and open to everyone creating more opportunity for all.
Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices.
Must demonstrate expert knowledge in one (1) or more of the following areas:
Incident Response, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis
Core Job Functions Include:
Investigations Investigating computer and information security incidents to determine extent of compromise to information and automated information systems
Escalations Responding to escalated events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems.
Research Researching attempted or successful efforts to compromise systems security and designs countermeasures.
Education - maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
Communications Provides information and updates to shift leads & leadership, creates pass-downs for next shift, work closely with supporting teams, provide feedback for new security policy and standards, engage with other teams and adjacencies through email and conference calls.
Digital Forensics As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country law
Coverage Must be willing to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10 hour shifts with four days on, three (3) days off and possible rotations across Day, Swing, and Graveyard shifts as needed.
To be successful in this position, you should be proficient with:
Incident Response Getting people to do the right thing in the middle of an investigation.
Offensive Techniques Penetration testing, IOCs, and exploits at all layers of the stack.
Logs - you should be comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats.
System Forensics Basic understanding of image acquisition techniques, memory forensics, and the like.
Networking Fundamentals - TCP/IP Protocols (HTTP, DNS, FTP, DHCP, ARP, etc.), and Wireshark/TCPDump.
Scripting Should be familiar with scripting in at least one of the following: python, perl or a similar language.
Risk Analysis Taking a vulnerability in a particular environment and understanding the practical associated risk.
Qualifications:
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or a related field.
Minimum three (3) years of professional experience in incident detection and response, malware analysis, or digital forensics.
Must have at least one (1) of the following certifications:
SANS GIAC: GCED, GCIA, GPEN, GWAPT, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON, GCIH
ISC2: CCFP, CCSP, CISSP
Cisco: CCNA, CCNP
CERT: CSIH
EC Council: CEH, ENSA, CNDA, ECSS, ECSP, ECES, CHFI, LPT, ECSA, or ECIH
Offensive Security: OSCP, OSCE, OSWP and OSEE
Digital Forensics: EnCE, CB, MiCFE, ACE, GCFA, GCFE
In addition, a minimum of one (1) year of specialized experience in one or more of the following areas:
Security Assessment or Offensive Security
Application Security
Security Operations Center/Security Incident Response
Cyber intelligence Analysis
At your work makes a difference. We believe that we can build a better form of commerce that is enabled by people, supported by technology, and open to everyone creating more opportunity for all.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.