Every now and then, I check the job boards to see what's out there. I have a good job, so I'm not actively applying for anything. I am trying to transition more into security. Part of my job includes network security (firewalls, nessus scans), but I came across this posting and thought, sounds interesting.....I started to wonder, what's the best way to get the knowledge for this type of position.
I'm studying for CISSP now (early stages), and even though it's listed in the job req, it's not going to help get the technical skills necessary
Is this something that I would want to invest in training from SANS for? Just curious
JOB SUMMARY:
The Senior Cybersecurity Engineer assists in deploying, maintaining, tuning, monitoring, and managing security tools related to the Realogy SOC. Senior Cybersecurity Engineer will function as a Level 2/Level 3 analyst, and act as a mentor to other members of the team. Senior Cybersecurity Engineer will review alerts from Level 1 analysts and Realogy network security devices, security information and event management (SIEM), and other tools as needed. Senior Cybersecurity Engineer works with other analysts to collect, correlate, and analyze security-relevant data, and respond to threats in a timely manner. This position reports to the SOC Director.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
- Monitor and respond to security events escalated by Level 1 security analysts and respond appropriately to protect Realogy information and assets
- Utilize endpoint products such as Carbon Black to identify malicious activity on the network
- Review daily and weekly reports generated by Level 1 security analysts for actionable tasks for the SOC team
- Collaborate with the Cyber Threat Intel Analyst (CTIA) to ensure appropriate security incident management and threat response processes are followed
- Provide technical expertise of security tool deployment and implementation supporting the SOC
- Analyze SOC functions and recommend upgrades/changes to ensure the security of the Company
- Continuously assess current state of security monitoring and recommend changes for improvement
- Proactively conduct research of Realogy network traffic and system activity looking for security anomalies and suspicious activities
- Perform Advanced Persistent Threat correlation between multiple security event sources such as firewall logs, threat intelligence feeds, AV, IDS, IPS, and Carbon Black Enterprise Response
- Responsible for tuning and implementing configuration changes related to IDS/IPS, endpoint security, SIEM, and other tools as necessary
- Responsible for in-depth reviews of log files and using this information to identify security events
- Provide mentoring to other members of the Security Operations Center team
MINIMUM QUALIFICATIONS:
- Bachelor’s degree in technical engineering or IT related field and 5+ years of experience in a large scale, complex, high performance network.
- 4+ years of experience working with a Security Incident & Event Management (SIEM) to correlate events across several devices
- Strong understanding of network devices such as Intrusion Detection Systems (IDS)/ Intrusion Prevent Systems (IPS), firewalls, network packet capture tools, and file integrity monitoring tools
- Expert level knowledge in incident prevention, detection and response tools such as Carbon Black
- Extensive knowledge of network and server security products, technologies, and protocols
- Requires background in at least 2 of the following domains: hacking and incident response; network forensics; security engineering, networking protocols and data center; security analysis and investigations
- Security certifications (CISSP, CISM, GIAC certs) preferred
- Strong problem-solving skills, critical thinking, excellent analytical ability, strong judgment and the ability to deliver high performance and high levels of customer satisfaction in a matrix managed environment.