Apply Now    
Job ID: JR0807032
Job Category: Sales
Primary Location: New York, NY US
Other Locations:
Job Type: Experienced Hire

Foundstone Threat Researcher

Job Description
About this position...We are currently seeking to add more experts to the Incident Response team, and would like to talk to you if you have demonstrable experience in disk and memory forensics, malware analysis, incident handling, SOC architecture, IR program development, and/or threat intelligence. We are looking for senior consultants with years of experience supporting Incident Response investigations, but will consider candidates with less experience if you are able to show an aptitude for, as well as, a deep understanding of Incident Response.What you will do...Conduct incident response investigations, to include host forensics, network forensics, malware analysis, and breach response.Lead customers in the response of incidents, conducting large-scale investigations on their behalf in their environments.Work with customer IT departments and 3rd parties to design and implement remediation and recovery plans.Develop custom scripts and tools to solve specific problems related to our investigations.Assist customers with IR program development, SOC design and creation, or assessment of network security posture.Research new techniques and artifacts and present your findings in a comprehensive format to various audiences.Ability to operate or perform with minimal supervision to deliver customer satisfaction


Qualifications

Minimum Qualifications:Looking for a minimum of 3-5 years of Cyber Security related technical industry experience.Fluent English required (oral, written and reading)15% Travel required.Proficiency in Scripting of 1 or more of the following: Perl, Python, Powershell, VBScript, BashAdditional Qualifications:Extensive disk and memory analysis experienceExpert knowledge of Incident Handling proceduresProficient understanding of malware and breach methodologyProficient understanding of networking protocols and secure network designProficiency in working from a Linux/Mac Operating System to implement OpenSource alternatives for IR purposesPreferred Qualifications:Enterprise consulting experienceExtensive behavioral and static malware analysis experienceExtensive network log and packet capture analysis experienceExperience in a CSIRTBackground in cyber threat intelligence collection, analysis, and disseminationCertifications from ISC2, GIAC, CompTIA, or EC-Council

Inside this Business Group

The Intel Security Group combines employees from McAfee and Intel – people with security expertise in hardware, software, and solutions into one business unit focused on building hardware, software, services and end-to-end security solutions. Intel Security Group sets the stage for new levels of collaboration and innovation and will drive leadership in the industry by providing ubiquitous security and identity protection for people and businesses worldwide.


Posting Statement. Intel prohibits discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Apply Now    

What would you like to do now?

Connect with Us

Get Job Alerts

Get started
Student Center

Find out more about working at Intel

Learn more
Hiring Process

Hiring Process

Learn more

Grow your network of opportunities