Cyber Security Analyst/Incident Response - Tier 3
TW2DE - Teleworker/Offsite-USA-DE
Job Description:
DXC Technology (NYSE: DXC) helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world’s largest companies and public sector organizations trust DXC to deploy services across the Enterprise Technology Stack to drive new levels of performance, competitiveness, and customer experience. Learn more about how we deliver excellence for our customers and colleagues at DXC.com.
Our DXC Security services helps customers assess risk and proactively address all facets of their security environment, from threat intelligence to compliance. We leverage proven methodologies, intelligent automation and industry-leading partners to tailor security solutions to our customers' unique business needs.
The Tier 3 Cyber Security Analyst/Incident Response position is a part of the Cyber Defense Center team. The CDC provides cyber security monitoring, reporting, and response for numerous external clients. Tier duties include, but are not limited to:
- Receive incident escalations from monitoring team and assist with real-time advanced analysis, response, and reporting.
- Mentor and assist in training Tier 1 and 2 analysts to aid in their skills development and analytical capabilities.
- Proactively hunt for threats and enacting identification, containment, and eradication measures while supporting recovery efforts.
- Point person for coordination with appropriate parties during a security incident – client, management, legal, security, operations, etc.
- Create thorough reports and documentation of all incidents and procedures, presenting findings to team and leadership on a routine basis
- Incident Response: remote remediation when possible and working with onsite teams when necessary. Detailed documentation of events and remediation steps taken.
- Root Cause Analysis: initiation and follow-through to ensure quality forensic materials are captured, writing reports with details and timelines of events with recommendations to avoid future occurrences
- Assist in the general maintenance and improvement of processes and/or playbooks.
- Conduct research regarding the latest methods, tools, and trends in digital forensics analysis
- Conduct analysis using logs, previous alerts, etc. to identify trends to identify and prevent potential incidents.
Basic Qualifications
- Bachelor's degree or equivalent combination of education and experience
- Six or more years of experience in information systems security
- Good communication skills to interact with clients, team members, management, and support personnel
- Good analytical and problem-solving skills
- Ability to work independently and as part of a team, be highly self-motivated
- Experience working with computer desktop packages such as Microsoft Word, Excel, etc.
- To conform to U.S. Government space technology …
This job isn't fresh anymore!
Search Fresh JobsJob Profile
Disability Insurance Employee wellness Health, dental, and vision insurance coverage Life and Disability insurance Paid holidays Paid Time Off Retirement savings plan Vision Insurance
Tasks- Communication
- Documentation
- Incident response
- Monitoring
- Process Improvement
- Root cause analysis
- Threat hunting
Analytical Communication Cyber Security Development Documentation Incident Response Leadership Microsoft Excel Microsoft Word Monitoring Problem-solving Research Security Social media Threat Intelligence
Experience6 years
EducationBachelor's degree Computer Science Related Field
Certifications TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9