Share this Job

Technical Lead Senior Cybersecurity Analyst

Apply now »

Date: Sep 16, 2022

Location: Airport City, IL, 70151

Company: Corning

Scope of Position:

As cybersecurity director, you will lead a team of data analysts, that oversees incident response, investigative analysis, and research on existing and emerging cyber threats, particularly those directed against the company's global networks. The team’s tasks include taking part of leading the maturation and optimization of our EDR capability through the development of custom content that focuses on threat actor TTPs and reduces false positives. As a team leader you will be expected to implement “an adversary thinking mode" in your team, and have your team engage in threat hunting operations leveraging their understanding of the tactics, techniques and procedures employed by advanced threats combined with intelligence from multiple sources. Additionally, you will be expected to provide reporting and briefings to other teams and leadership in order to maintain appropriate levels of situational awareness. Responsibilities: • Leading the development of host-based detection content in EDR solutions such as Crowd Strike, Microsoft Defender, other leading vendors

 

• Taking charge of network analysis and host activity associated with intrusion attempts by advanced attackers.

• Managing the performance of network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output and mentor cyber analysts.

• Leading, supporting, and mentoring the team’s enterprise incident response efforts.

• Leveraging the team’s understanding of tactics, techniques and procedures associated with advanced threats to create and evolve custom detections that mitigate highly dynamic threats to the enterprise.

• Overseeing the employment of advanced forensic tools and techniques for attack reconstruction and threat intelligence gathering streamlining, documenting, and sharing updated processes.

• Directing the proactive research of advanced and emerging cyber threats, and the application of analytical understanding of attacker methodologies, system vulnerabilities, and key indicators of attacks and exploits in threat hunting efforts.

• Assuring the team’s contribution to threat intelligence reports and briefings that provide situational awareness of cyber threats impacting the company's global network infrastructure, to every level of the organization.

• Directing the team’s collaboration efforts in using information and knowledge sharing networks and professional relationships to achieve common goals.

• Managing the team’s on-call support for incident response efforts outside of core hours as needed.

 

Education and Experience:

• Bachelor's degree and 10+ years of threat analysis and incident response experience - additional years of relevant experience may be considered in lieu of Bachelor's degree

• Relevant certifications (CISSP, SANS GIAC, CEH, etc.)

 

Required Skills:

• Understanding of cyber threat models, including ATT&CK, Cyber Kill Chain, Racetrack, Diamond Model, etc.

• Experience working with EDR tools

• Experience with ELK stack, Splunk, Microsoft Sentinel, or other SIEM-type platform

• Experience in conventional network\host-based intrusion analysis, digital forensics, or malware analysis.

• Experience performing "deep dive" analysis and correlation of log data and forensic artifacts from multiple sources.

• Experience in incident response activities

• Strong understanding of Operating Systems and Network Protocols.

• Proficiency with Microsoft Windows administrative tools, and the Unix/Linux command line.

• Must be proficient, verbally and in writing with the English language. Preferred Skills

• Management of the team’s communication regarding actionable threat intelligence to both technical and executive-level stakeholders.

• Familiarity with customizing and deploying Sysmon • Familiarity with common languages (like Perl and Python) to parse logs, automate processes, and integrate systems.

• Previous experience as Threat Researcher and/or Intelligence Analyst.

• Perform adversary emulation to validate mitigations and detections.

• Experience with dynamic malware analysis, and reverse engineering.

• Experience in cryptography or cryptanalysis • Ability to create, modify, and implement both Snort and YARA signatures, sharing best practices with colleagues.

• Published research papers at conferences or through other mediums (blogs, articles).

• Working knowledge of Computer Network Exploitation (CNE), or Computer Network Attack (CNA) tools and techniques.

• A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats.

• Experience applying threat and data modeling, advanced data correlation, and statistical analysis to develop alerts, notable events, investigative dashboards, and metrics driven reports.
 

Travel Requirement

• Up to 10%