
Bilingual GIR Analyst
Kforce Inc, New York, NY, United States
Responsibilities
Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement
Security event monitoring, investigation, and overall incident response process
Investigate potential cybersecurity events across multiple environments using various tools and techniques
Development of information security policies, standards, and procedures
Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies
Create reports analyzing activities or trends both within and outside of the organization
Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
Reviews internal logs and alerts to identify potential cybersecurity events
Triage cases based on output from automated alerts, and determine when to elevate to other teams
Monitors external service provider activity to detect potential cybersecurity events
Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations
Analyzes compromised systems and remediates to a clean state
Performs breach indicator assessments to investigate network traffic for malicious activity
Assists with internal or third-party employee investigations
Requirements
Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related discipline
Relevant technical and industry certifications, such as CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferred
5+ years of experience working in the Cybersecurity Operations or Information Security
Experience in one or more security domains including Incident Response and Forensics, Security Governance and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management preferred
Experience with information security risk management, including information security audits, reviews, and risk assessments
Experience with security data collection, analysis and correlation
Detailed knowledge and experience in security and regulatory frameworks (CRI, ISO 27001, NIST 800 series, FFIEC, SOC2, STAR, etc.)
Strong Incident Response knowledge and experience
Understanding of offensive security to include common attack methods
Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
Theoretical and practical knowledge with Mac OS, Linux, Windows operating systems and clouds
Well‑developed analytic, qualitative, and quantitative reasoning skills
Demonstrated creative problem‑solving abilities
A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures
Both English and Japanese language skills as well as cultural fluency are strongly required
Strong time management skills to balance multiple activities and lead junior analysts as needed
The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.
We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.
Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.
This job is not eligible for bonuses, incentives or commissions.
Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
By clicking “Apply Today” you agree to receive calls, AI‑generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
#J-18808-Ljbffr
Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement
Security event monitoring, investigation, and overall incident response process
Investigate potential cybersecurity events across multiple environments using various tools and techniques
Development of information security policies, standards, and procedures
Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies
Create reports analyzing activities or trends both within and outside of the organization
Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
Reviews internal logs and alerts to identify potential cybersecurity events
Triage cases based on output from automated alerts, and determine when to elevate to other teams
Monitors external service provider activity to detect potential cybersecurity events
Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations
Analyzes compromised systems and remediates to a clean state
Performs breach indicator assessments to investigate network traffic for malicious activity
Assists with internal or third-party employee investigations
Requirements
Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related discipline
Relevant technical and industry certifications, such as CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferred
5+ years of experience working in the Cybersecurity Operations or Information Security
Experience in one or more security domains including Incident Response and Forensics, Security Governance and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management preferred
Experience with information security risk management, including information security audits, reviews, and risk assessments
Experience with security data collection, analysis and correlation
Detailed knowledge and experience in security and regulatory frameworks (CRI, ISO 27001, NIST 800 series, FFIEC, SOC2, STAR, etc.)
Strong Incident Response knowledge and experience
Understanding of offensive security to include common attack methods
Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
Theoretical and practical knowledge with Mac OS, Linux, Windows operating systems and clouds
Well‑developed analytic, qualitative, and quantitative reasoning skills
Demonstrated creative problem‑solving abilities
A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures
Both English and Japanese language skills as well as cultural fluency are strongly required
Strong time management skills to balance multiple activities and lead junior analysts as needed
The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.
We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.
Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.
This job is not eligible for bonuses, incentives or commissions.
Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
By clicking “Apply Today” you agree to receive calls, AI‑generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
#J-18808-Ljbffr