This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Find jobs in Texas today!

To post a job, login or create an account |  Post a Job

  Jobs in Texas  

Bringing the best, highest paying job offers near you

previous arrow
next arrow

Incident Response Consultant

Latitude, Inc.

This is a Full-time position in Austin, TX posted June 11, 2021.

Openings at multiple levels.  **Above Market Rate Salary plus bonus**
Conduct Incident Response investigation in response to data breaches and security incidents leveraging security tools including: System Forensics tools such as Encase, Axiom, FTK Imager, X-Ways, SIFT; Data analytic tools including Splunk, ELK Stack; Security tools including ArcSight, AlienVault, NetWitness; Fidelis, FireEye, RedSeal, SkyBox, Cylance, Suricata, Solarwinds, Palo Alto, Cisco switches, routers and security appliances, as well as commercial, open source and custom proprietary investigation tools to determine source of compromises and malicious activity that occurred in client environments.

Conduct SOC and CERT monitoring and analysis using: SIEM tools such as ArcSight and AlienVault; Data analytic tools such as Splunk and ELK Stack; Network Modeling tools such as RedSeal and Skybox; Malware tools such as Cylance and Sentinel One; APT network-based detection and mitigation tools such as Fidelis, FireEye; and Network management tools such as SolarWinds.

Conduct security gap analysis assessments, penetration testing / red-team assessments, and vulnerability assessments to identify security vulnerabilities and issues in client environments.

Conduct compliance audits and assessments for Sarbanes Oxley, PCI, ISO 27001, NIST 800-171, HIPAA/HITECH, GDPR and others as required.

Assist with managing the full life-cycle of incident response engagements including: scoping work, guiding clients through the Incident Response process; containing security incidents involving sophisticated APT level actors; providing guidance on longer term remediation recommendations; and managing both short-term and long-term containment and remediation.

Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations.

Build scripts, tools, or methodologies to enhance incident investigation processes.

Develop comprehensive and accurate reports and presentations for both technical and executive audiences.

Effectively communicate investigative findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel.

Work with network security and IT operations at clients to implement containment and eradication actions and remediation measures in response to incidents.

Assist with scoping prospective engagements, participating in investigations from kickoff through remediation, and mentor less experienced staff.

Mentor the team; especially the more junior level incident response consultants in incident response and forensics.


Bachelors degree in a Computer Science, Computer Engineering, Information Assurance, Forensic Sciences, or related technical field; Graduate degree preferred.

Minimum 3-5 years of experience; minimum 10 years of experience if no degree Must be eligible to work in the US without sponsorship Technical expertise in at least three of the following areas: SOC & CERT Operations Tier 1-3 Network Security Monitoring (NSM), network traffic analysis, and log analysis Forensic imaging including chain of custody Windows and Unix disk and memory forensics Penetration Testing / Vulnerability Scanning Security Architect and Incident remediation Static and dynamic malware analysis
Powered by JazzHR

Please add your adsense or publicity code here (inc/structure/adsfooter.php)