Principal Information Security Analyst Internet & Ecommerce - Portsmouth, NH at Geebo

Principal Information Security Analyst

Company Name:
Liberty Mutual
Title: Principal Information Security Analyst
Location: NH-Portsmouth
Other Locations:
Advance your Information Systems (IT) career at Liberty Mutual Insurance - A Fortune 100 Company.
Liberty Mutual Insurance Information Technology is actively searching for an experienced Principal Information Security Analyst. In this role you will be responsible for the escalation, oversight and overflow of Security incidents; responsible for subject matter expertise (SMEs) and oversight of Tier 1 and Tier 2 Analyst activities. Work may be an escalation from a lower Tier Analyst or as supplemental workforce in eventful times. Tier 3 Analysts are generally staffed Monday through Friday during day shift in the local time zone. Tier 3 Analysts are required 24x7 per on-call schedule. Analyze medium to high complexity technical and system problems.
Responsibilities:
Provide first responder forensics analysis and investigation of Sev 1 security incidents.
Provide forensics analysis and investigation of Sev 2 to Sev 3 security incidents through escalation from Tier 2 Analysts.
Work with Tier 2 Analysts to communicate findings during investigation for documentation and escalation according to LSERT procedures.
Drives containment strategy during data loss or breach events.
Triage and resolve advanced vendor attack such as botnets and advanced persistent malware.
Works directly with data asset owners and business response plan owners during high severity incidents.
Reviews aggregated threat feed data from Tier 2 Analysts to determine tuning of countermeasure required or vulnerabilities to be remediated outside of the RiskIT process.
Reviews vulnerability scans for high vulnerabilities and prioritizes remediation actions required for asset owner and feed Tier 2 Analyst for ticketing and tracking.
Provide tuning recommendations of policy in security control tools to tool administrators based on findings during investigations or threat information reviews.
Tuning of IDS, proxy policy, in-line malware tools based on threat feeds, trust and reputation data incidents or vulnerabilities and exploits of downstream systems.
Issue documentation and proactively contacting customers when an issue is resolved to ensure the service provided met or exceeded the customer expectations.
Review weekly security incident metrics.
Find trends in security incident for security problem identification, control deficiencies, gaps in countermeasure capabilities and publish findings monthly for operational reviews.
Knowledge base article submissions for handling low severity incidents.
Monitoring and awareness of what is happening in the data security industry and on various newsgroups/mailing lists regarding security and security incidents.
Bachelor''s Degree in technical or business discipline or equivalent experience.
Generally a minimum of 5 year related experience.
Extensive knowledge of IT concepts, strategies and methodologies.
Extensive knowledge of practices and procedures of operating systems and sub systems and/or networking technologies.
Extensive of operating system utilities and applications.
Extensive knowledge of Information Security.
In-depth knowledge of a business function(s) and of business operations.
Complex Negotiation skills; oral and written communication skills.
Knowledge of network security zones, firewall configurations, IDS policies; knowledge of systems communications from layer 1 to 7; knowledge of industry configurations standards
Experience with systems administration, middleware and application administration; experience with network and network security tools administration;
Knowledge of log formats and ability to aggregate and parse log data for syslog, http logs, and DB logs for investigation purposes; in-depth experience with log search tools; usage of regular expressions and natural language queries; in-depth knowledge of packet capture and analysis
Experience with Security Administration Tools (NMAP, Nessus, Metasploit, Netcaf, Splunk); ability to develop a containment strategy and execute; GICH certification with 5 years experience.
Training Recommended:
Security Essentials - SEC 401 (optional GSEC certification)
Intrusion Detection in Depth - SEC503 (optional GCIA certification)
Hacker Techniques Exploits & Incident Handling - SEC504 (optional GCIH certification)
Hacker Guard Security Baseline Training - SEC464
Advanced Security Essentials - SEC501 (optional GCED certification)
Perimeter Protection in Depth - SEC502 (optional GCFW certification)
Securing Windows and Resisting Malware-SEC505 (optional GCUX cert)
Securing Linux/Unix - SEC506 (optional GCUX certification)
Certified Information Systems Security Professional - CISSP
Benefits:
We recognize that talented people are attracted to companies that provide competitive pay, comprehensive benefits packages and outstanding advancement opportunities. For this reason we offer a Comprehensive Benefits Plan that includes the following:
401K and Company paid pension plan
Medical coverage
Dental coverage
Paid time-off
Pay-for-Performance
Discounts on automobile and homeowner''s insurance
Discount fitness memberships
Flexible spending accounts
Tuition reimbursement
Vision care coverage
Work/Life resources
Credit Union membership
Employee and Dependent life insurance
Disability insurance
Accidental death & dismemberment insurance
Overview:
We believe strongly that commercial success can be achieved in a manner consistent with principles and ideals that bind us together as one company, that set us apart from our competitors, and that in the end will allow us to say we have succeeded commercially by doing the right thing the right way.
We believe that the Company''s success is inextricably linked to our employees'' satisfaction and success: satisfaction that they work for an industry leader committed to improving safety, satisfaction that they work for a company that does the right thing, and satisfaction that the company will reward them for their contributions and provide opportunities for personal growth and success.
We believe our employees take pride in knowing that they help people live safer more secure lives every day.
Responsibility. What''s your policy?Information TechnologyEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.