Security Consultant Incident Response and Forensics -FireEye, Inc. – Dubai

Security Consultant Incident Response and Forensics -FireEye, Inc. - Dubai

Company Description

FireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,500 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.

Job Description
Mandiant Consulting Services is focused on the long-term success of our customers by providing talented, passionate, and specialized security monitoring, threat intelligence, and incident management consulting expertise. We are looking for a motivated and experienced consulting manager with great customer service skills to help customers assess, design, and build their own advanced threat detection capability and help to continually improve our own program methodology. The successful candidate will possess strong consulting skills, be adept in leading multiple projects under tight deadlines, and possess in-depth experience in security operations, cyber threat intelligence, and computer incident response.

What you will do:

  • Host/network based forensic investigations
  • Develop custom reports based on data from multiple sources, including FireEye appliances, FireEye threat intelligence, network sensors, and outside intelligence feeds
  • Present technical material in a clear, organized briefing to a mix of technical and non-technical personnel
  • Identify opportunities to integrate FireEye appliances with other security products in customer’s network
  • Develop custom reports and other custom configurations / use cases for FireEye products within customer’s environment
  • Help determine the extent of the compromise, attributes of any malware and possible data ex-filtrated
  • Develop, document and manage containment strategy
  • Maintain current knowledge of tools and best-practices in advanced persistent threats; tools, techniques, and procedures of attackers; and forensics and incident response

  • Experience in an analytical role of either network forensics analyst, threat analyst, incident response or security engineer/ consultant
  • One or more of the following technical certifications: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), EnCE or equivalent certifications in these areas
  • Experience developing and managing incident response programs
  • Expertise in analysis of TCP/IP network communication protocols
  • Experience conducting analysis of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operations
  • Experience with advanced computer exploitation methodologies
  • Ability to synthesize data from multiple sources and present concise, relevant information to a non-technical audience
  • Experience with FireEye products, highly desired
  • Experience with a scripting language such as Perl, Python, or other scripting language in an incident handling environment, highly desired

Additional Information

  • Demonstrated ability to make decisions on remediation and countermeasures for challenging information security threats
  • Excellent communication and presentation skills with the ability to present to a variety of external audiences, including being able to interact with senior executives
  • Exceptional written communication
  • Strong leadership skills with the ability to prioritize and execute in a methodical and disciplined manner
  • Ability to set and manage expectations with senior stake-holders and team members
  • Excellent knowledge of current information security solutions and technologies, including network and host based products
  • Experience implementing NIST information security guidelines in a diverse network environment
  • Experience and knowledge of packet flow/TCP/UDP traffic, firewall technologies, proxy technologies, anti-virus, spam and spyware solutions (Gateway and SaaS)
  • Malware/security experience
  • Programming/scripting skills, highly desired

Leave a Reply

Your email address will not be published. Required fields are marked *