ConcordRecruiter Since 2001
the smart solution for Concord jobs

Expert Incident Response Analyst

Company: PG&E Corp
Location: Concord
Posted on: June 6, 2021

Job Description:

Expert Incident Response Analyst Concord, CA, US, 94518 #job-location.job-location-inline { display: inline; } Requisition ID# 79382Job Category : Information TechnologyJob Level : Individual ContributorBusiness Unit: Information TechnologyJob Location: ConcordDepartment Summary The Cybersecurity function is led by PG&E's Senior VP and Chief Information Officer and is responsible for cybersecurity and risk management across the organization. The Security Intelligence and Operations Center (SIOC) is responsible for ensuring that PG&E proactively identifies and assesses threats to its user and operational network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape. Position Summary This is a challenging and fast passed position in PG&E's Security Intelligence and Operations Center (SIOC) which is responsible for detecting, analyzing and responding to any suspicious cyber security activity across PG&E's business and operational networks. The SIOC is a critical team within PG&E's broader Information Security team. Job Responsibilities Utilizes digital forensic tools including Guidance EnCase to execute digital investigations and perform incident response activities Conduct investigations of computer-based events and other security issues Establishes links between suspects and other violators by piecing together evidence uncovered from a variety of sources Establishes and maintains defensible evidentiary process for all investigations Uses & maximizes relevant investigative tools, software and hardware Experience with / daily use of EDR Familiarity with cloud service providers (AWS) and associated security tools desired Collection and examination of images of various platforms/devices (including Windows, Mac, mobile devices) Coordinates with IT to leverage skills and resources in support of investigations Advances the practice and science of information security investigation Perform hunting for malicious activity across the network and digital assets Respond to computer security incidents and conduct threat analysis Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network Perform detailed investigation and response activities for potential security incidents Provide accurate and priority driven analysis on cyber activity/threats Perform payload analysis of packets Perform dynamic analysis on suspected malware samples Recommends implementation of countermeasures or mitigating controls Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity Develop innovative monitoring and detection solutions using PG&E tools and other skillsets such as scripting Mentor junior staff in cybersecurity techniques and processes Resolve or coordinate the resolution of cyber security events Maintain incident logs with relevant activity Document investigation results, ensuring relevant details are passed to senior analysts and stakeholders Participate in root cause analysis or lessons learned sessions Write technical articles for knowledge sharing Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units Qualifications Minimum: High school diploma or equivalent 6 years of related IT work experience to include information security working within incident response/forensics or equivalent functions within Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC) experience Desired: Bachelor's degree in Cybersecurity, Intelligence, or a related field or equivalent work experience; or a combination of education, training, and relevant work experience. Formal IT Security/Network Certification such as WCNA, CompTIA Security +, Cisco CCNA, SANS GCIH, GMON, or other relevant Cyber Security certifications Utility Industry experience SANS GIAC Certified Forensic Analyst (GCFA) or SANS GIAC Certified Forensic Examiner (GCFE) or SANS GIAC Reverse Engineering Malware (GREM) or related Degree Experience with scripting in Perl/Python/Ruby/PowerShell Experience with both desktop-based and server-based forensics Malware reverse engineering skills Knowledge, Skills, and Abilities/Technical Competencies: Previous experience with a variety of cyber investigation tools Strong technical skills including malware analysis, memory forensics, live response techniques, registry analysis, scripting, and other relevant technical security skills such as memory forensics Experience investigating and mitigating APT style attacks Strong case management and forensic procedural skills- Intelligence driven defense utilizing the Cyber Kill Chain Deep knowledge of log, network, and system forensic investigation techniques Deep knowledge of diverse operating systems, networking protocols, and systems administration Deep knowledge of commercial forensic tools - working knowledge of Axiom preferred Deep knowledge of common indicators of compromise and of methods for detecting these incidents Deep knowledge of IT core infrastructure and cyber security components/devices Deep knowledge of TCP/IP Networking and knowledge of the OSI model Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs Excellent problem solving, critical thinking, and analytical skills - ability to de-construct problems Strong customer service skills and decision-making skills Significant experience with packet analysis (Wireshark) and malware analysis preferred Working knowledge of PG&E infrastructure preferred IBM QRadar experience preferred @media (min-width: 992px) { .col-size { height:230px; }} Our Mission To safely and reliably deliver affordable and clean energy to our customers and communities every single day, while building the energy network of tomorrow. Our Vision With a sustainable energy future as our North Star, we will meet the challenge of climate change while providing affordable energy for all customers. Our Culture We put safety first. We are accountable. We act with integrity, transparency and humility. We are here to serve our customers. We embrace change, innovation and continuous improvement. We value diversity and inclusion. We speak up, listen up and follow up. We succeed through collaboration and partnership. We are one team. .buttontext02407e333c5c18da a{ border: 1px solid transparent; } .buttontext02407e333c5c18da a:focus{ border: 1px dashed #009de0 important; outline: none important; } CompanyPacific Gas and Electric Company (PG&E), a subsidiary ofPG&E Corporation(NYSE:PCG), is one of the largest combined natural gas and electric companies in the United States. Based in San Francisco, our 24,000 employees deliver safe, reliable, affordable and clean energy to nearly 16 million people throughout our Northern and Central California service area, stretching from Eureka to Bakersfield and from the Pacific Ocean to the Sierra Nevada.More About Our CompanyEEOPacific Gas and Electric Company is an Affirmative Action and Equal Employment Opportunity employer that actively pursues and hires a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, sex, age, religion, physical or mental disability status, medical condition, protected veteran status, marital status, pregnancy, sexual orientation, gender, gender identity, gender expression, genetic information or any other factor that is not related to the job.Employee Privacy Notice The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. CCPA grants new and far-reaching privacy rights to all California residents. The law also entitles job applicants, employees and non-employee workers to be notified of what personal information PG&E collects and for what purpose. The Employee Privacy Notice can be accessed through the following link: Employee Privacy Notice PG&E will consider qualified applicants with arrest and conviction records for employment in a manner consistent with all state and local laws. Nearest Major Market: San Francisco Nearest Secondary Market: Oakland

Keywords: PG&E Corp, Concord , Expert Incident Response Analyst, Other , Concord, California

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category

Log In or Create An Account

Get the latest California jobs by following @recnetCA on Twitter!

Concord RSS job feeds