Information Security Analyst – National Incident Response Team IRIS – Technology Services Group recruitment
Area Overview: The National Incident Response Team (NIRT), a national service provider for the Federal Reserve System, delivers effective and efficient national intrusion detection, incident response, security intelligence, threat assessment, and vulnerability assessment services for the Federal Reserve System. The mission of the National Incident Response Team is to play a leading role in the Federal Reserve System's efforts to protect is information systems against unauthorized use.
Job Description: As a member of the NIRT, this individual will provide incident response services to the FRS and Treasury. These services include managing complex tracking and data analysis tasks in order to identify computer attacks and probes as they occur, and being responsible for all technical aspects of national Computer Emergency Response Team (CERT) operations including intrusion detection, new incident tracking, documentation, analytical investigation, problem closure and future security threat countermeasures. The individual will also complete projects and tasks on an as needed basis, and interact directly with FRS technical and business customers located across the United States.
Skills
Required Skills: The candidate should possess in-depth knowledge and understanding of a breadth of information technologies and information security topics. Specifically, this should include the ability to:
- Analyze and review cases until closure; this includes investigating and recommending appropriate corrective actions for cyber security incidents; and communicating with the implementation staff responsible or taking corrective actions.
- Research and develop testing tools, techniques, and process improvements in support of security event detection and incident response.
- Fuse cyber intelligence collected from diverse sources to drive strategic and operational responses to developments in the threat landscape.
- Demonstrate a strong knowledge of, and ability to communicate about, the information security threat landscape.
- Carry out post mortem analysis on logs, traffic flows, and other activities to identify malicious activity.
- Be able to provide technical analysis in support of forensic investigations.
- Drive the development, testing and implementation of security plans, products, control techniques, security policy and procedures for national network security oversight and intrusion response tracking.
- Assess vulnerabilities, then communicates to System-wide information security staff to ensure prompt and effective distribution of alerts and that incidents are addressed in the most effective and efficient manner possible.
- Execute tasks and lead projects as needed.
- Participate in or lead customer and partner facing meetings and projects, including those that involve technical topics or technical service delivery.
- Demonstrate excellent communication skills, analytical ability, strong judgment, and the ability to work effectively with clients and IT management and staffs.
- Communicate technical issues to technical and non-technical business representatives.
- Understand strategic objectives and vision, and work towards those goals.
Top 5-10 technical skills required for the job:
- In depth understanding and knowledge of the information security threat landscape and the ability to apply that expertise to proactive recommendations and reactive security incidents.
- Ability to handle information security incidents end-to-end.
- Ability to assess vulnerabilities for potential impact and exploitation.
- Ability to communicate verbally and through written material technical analysis to various audiences.
- Initiative and self management skills that enable an individual to independently complete complex tasks and assignments while simultaneously balancing multiple priorities.
Preferred Skills:
- Experience writing Perl, Python, scripting, programming, or other languages is a plus.
- Large-scale data mining and anomaly detection.
- Strong understanding of malware and exploit lifecycle.
- Comprehensively understand networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols.
- Experience administering and troubleshooting operating systems, including Solaris, Linux, and Microsoft Windows Server is a plus.
- Database, SQL knowledge is a plus.
- Thoroughly understand TCP/IP protocol.
- Ability to perform or learn system-level or static reverse engineering.
- Ability to perform or learn detailed computer forensics
Education/Certifications: Bachelors degree in field or related discipline. Certifications complementing education are a plus. Advanced degree a plus. The ability to obtain and maintain National Security Clearance is also required.