Salary
💰 $145,600 - $218,400 per year
Tech Stack
AWSAzureCloudCyber SecurityElasticSearchGoogle Cloud PlatformLinuxMacOSPythonSplunk
About the role
- Support the business operations of SIE through rapid mitigation of cyber security incidents and coordinate incident response within the organization
- Serve as a trusted point of contact and clearinghouse for security incident-related information and cooperate with other security teams within Sony and the gaming industry
- Respond to critical incidents, threats, actively exploited vulnerabilities and bring these issues to resolution
- Actively drive incident response, document and communicate findings, coordinate efforts and provide periodic updates to leadership
- Improve and challenge existing processes and procedures; maintain and update incident response plan (IRP) and other department related documentation
- Perform digital forensics investigations and malware analysis; manage and improve the forensic acquisition and analysis environment
- Perform threat hunting activities, contribute to detection engineering efforts and participate in purple teaming
- Use and expand the capabilities of existing analytical tools and technologies; recommend new technologies as appropriate
- Maintain current knowledge of tools and best-practices in advanced persistent threats; tools, techniques, and procedures of attackers; forensics and incident response
- Act as mentor for SOC Analysts and participate in on-call responsibilities
Requirements
- 5+ years of experience in a hands-on technical role working within the Information Security Field, with emphasis on Intrusion Detection, Incident Response, Digital Forensics and Malware Analysis
- Ability to prioritize and implement in a methodical manner, as well as to set and handle expectations with senior leadership and team members, high attention to detail
- Good understanding of and hands-on experience with operating systems (Windows, Linux, MacOS) and web applications
- Proficiency in networking concepts and experienced in network device configuration, firewalling and protocol analyzers
- Experience in cloud-based environments such as AWS, Azure, GCP
- Experience with Python and one or more languages such as PowerShell in an incident handling environment
- Experience in digital forensics and tools such as Axiom, FTK, Volatility, Surge, Rekall, Cellebrite, GRR, X-Ways
- Advanced knowledge and experience with Splunk or ElasticSearch
- Experience and proficiency with any of the following: Intrusion analysis, Host-Based Forensics, Network Forensics, Malware Analysis concepts and methods
- Experience in security engineering such as security device installations, configurations, troubleshooting
- Knowledge of and experience in Endpoint Security, Cloud Security, Network Security, Application Security monitoring
- Familiarity with network and application penetration testing
- Familiarity with reverse engineering malware and tools associated with the task
- Bachelor of Science or equivalent experience in Computer Science, Computer Engineering, Information Technology, Cyber Security, Intelligence studies
- Certifications such as GIAC GCIA, GCIH, GCFA, GCFE, GREM are a plus