GE is an equal opportunity employer, offering a great work environment, challenging career opportunities, professional training and competitive compensation.
The Analyst – Advanced Threats Operations will respond to cyber incidents stemming from external threats, specializing in host and log centric forensic analysis. The Analyst will also be responsible for leading and working on projects that will support tactical and strategic business objectives. Demonstration of leadership abilities in a large corporate environment as well as a strong comprehension of malware, emerging threats and calculating risk will be critical to success.
Perform daily response operations with a schedule that may involve nontraditional working hours
Specialize in host and log centric analysis (SIEM, Yara, live response, media analysis, malware examination and reverse engineering)
Ability to identify compromised computers using logs and other related computer centric evidence sources
Write signatures, tune systems and tools and develop scripts and correlation rules
Lead small to medium size projects as directed by management
As requested, develop and deliver metrics to leadership
Bachelor’s Degree in Computer Science or a related technical degree (or a minimum 4 years of IT experience)
Due to U.S. Government restrictions to certain types of technology and technical data involved with this position as well as the need to periodically visit domestic military bases to consult with DoD personnel on extranet tools, this position is limited to U.S. Citizens
Must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act
Must be willing to work off-shift hours
Additional Eligibility Qualifications
GE will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a background investigation and drug screen.
Detailed understanding of Cyber Crime and / or APT and associated tactics
Experience with Network Security Monitoring, SIEM and / or other log aggregation and correlation tools
Administrative level familiarity with *NIX environment
Experience with Yara, Python, Ruby, Perl and / or other languages
Experience with host-centric tools (FTK, Encase, HB-Gary Responder, MIR, F-Response, Sleuthkit or other forensic software, Splunk, SIEM) and techniques (memory, disk, and log analysis) to detect and respond to intrusions
Strong oral and written communication skills
Active US government security clearance
Previous hands on experience in the information security field
Previous hands on scripting or programming experience
Section 19 Job
YOU MUST BE ABLE TO SATISFY THE REQUIREMENTS OF SECTION 19 OF THE FEDERAL DEPOSIT INSURANCE ACT.
Apply to job
Send to friend
Save to cart
GE Careers - 24 months ago
copy to clipboard
At GE, developing people is embedded in our culture and integral to our growth. Developing people is how we have succeeded across industries...