Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Senior Analyst, Cybersecurity Charlotte, NC Remote GCIH, GCFA, GCTI, GREM, GCIA, or GNFA InfoSec Jobs

Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Senior Analyst, Cybersecurity
Company Corning
Location Charlotte, NC/Remote
Preferred GIAC Certifications GCIH, GCFA, GCTI, GREM, GCIA, or GNFA
Travel 10%
Salary Not provided
URL https://corningjobs.corning.com/job/Charlotte-Senior-Analyst%2C-Cybersecurity-NC-28216/817242000/
Contact Name No Contact
Contact Email donotemail/at/email.org
Expires 2022-03-11

Job Description

Requisition Number: 51563

Corning is one of the world’s leading innovators in materials science. For more than 160 years, Corning has applied its unparalleled expertise in specialty glass, ceramics, and optical physics to develop products that have created new industries and transformed people’s lives.

Corning succeeds through sustained investment in R&D, a unique combination of material and process innovation, and close collaboration with customers to solve tough technology challenges.

The global Information Technology (IT) Function is leading efforts to align IT and Business Strategy, leverage IT investments, and optimize end to end business processes and associated information integration technologies. Through these efforts, IT helps to improve the competitive position of Corning's businesses through IT enabled processes. IT also delivers Information Technology applications, infrastructure, and project services in a cost efficient manner to Corning worldwide.

Scope of Position: In this position, you will perform data analysis, incident response, investigative analysis, and research on existing and emerging cyber threats, particularly those directed against the company's global networks. You will lead the maturation and optimization of our EDR capability through the development of custom content that focuses on threat actor TTPs and reduces false positives. You will be expected to "think like an adversary" and engage in threat hunting operations leveraging your understanding of the tactics, techniques and procedures employed by advanced threats combined with intelligence from multiple sources, and provide reporting and briefings to other teams and leadership in order to maintain appropriate levels of situational awareness.

This role has the ability to be virtual.

Responsibilities:

Develop host-based detection content in Microsoft Defender
Analyze network and host activity associated with intrusion attempts by advanced attackers.
Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output.
Support and lead enterprise incident response efforts
Leverage understanding of tactics, techniques and procedures associated with advanced threats to create and evolve custom detections that mitigate highly dynamic threats to the enterprise.
Employ advanced forensic tools and techniques for attack reconstruction and threat intelligence gathering.
Proactively research advanced and emerging cyber threats, and apply analytical understanding of attacker methodologies, system vulnerabilities, and key indicators of attacks and exploits in threat hunting efforts
Contribute to threat intelligence reports and briefings that provide situational awareness of cyber threats impacting the company's global network infrastructure, to every level of the organization.
Collaborate using information and knowledge sharing networks and professional relationships to achieve common goals.
Provide on-call support for incident response efforts outside of core hours as needed. Education and Experience: • Relevant certifications (CISSP, SANS GIAC, CEH, etc.)


Required Skills:

Understanding of cyber threat models, including ATT&CK, Cyber Kill Chain, Racetrack, Diamond Model, etc.
Experience working with EDR tools, Microsoft Defender preferred
Experience with Splunk (preferred) or other SIEM-type platform
Strong experience in conventional network\host-based intrusion analysis, digital forensics, or malware analysis.
Strong experience performing "deep dive" analysis and correlation of log data and forensic artifacts from multiple sources.
Strong experience leading and contributing to incident response activities
Strong understanding of Operating Systems and Network Protocols.
Proficiency with Microsoft Windows administrative tools, and the Unix/Linux command line.


Preferred Skills:

Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders.
Familiarity with common languages (like Perl and Python) to parse logs, automate processes, and integrate systems.
Previous experience as Threat Researcher and/or Intelligence Analyst.
Experience with dynamic malware analysis, and reverse engineering.
Experience in cryptography or cryptanalysis
Ability to create, modify, and implement both Snort and YARA signatures.
Published research papers at conferences or through other mediums (blogs, articles).
Working knowledge of Computer Network Exploitation (CNE), or Computer Network Attack (CNA) tools and techniques.
A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats.
Experience applying threat and data modeling, advanced data correlation, and statistical analysis to develop alerts, notable events, investigative dashboards, and metrics driven reports.


Travel Requirement: Up to 10%