GE is an equal opportunity employer, offering a great work environment, challenging career opportunities, professional training and competitive compensation.
The Analyst – Detection Operations will primarily work within established operating procedures to develop signatures for deployment to a variety of tools within the GE network. The Analyst will also be responsible for leading and working on projects that will support tactical and strategic business objectives. Demonstration of leadership abilities in a large corporate environment as well as a strong comprehension of malware, emerging threats and calculating risk will be critical to success.
Perform daily response operations with a schedule that may involve nontraditional working hours
Specialize in network, host and log centric analysis (Network Security Monitoring, SIEM, HIPS, HIDS, etc…)
Ability to identify compromised computers using logs and other related computer centric evidence sources
Write signatures, tune systems and tools and develop scripts and correlation rules
Lead small to medium size projects as directed by management
As requested, develop and deliver metrics to leadership
Bachelor’s Degree in Computer Science or a related technical degree (or a minimum 4 years of IT experience)
Due to U.S. Government restrictions to certain types of technology and technical data involved with this position as well as the need to periodically visit domestic military bases to consult with DoD personnel on extranet tools, this position is limited to U.S. Citizens
Must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act
Must be willing to work off-shift hours
Additional Eligibility Qualifications
GE will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a background investigation and drug screen.
Detailed understanding of Cyber Crime and/or APT and associated tactics
Experience with Network Security Monitoring, SIEM and / or other log aggregation and correlation tools
Experience with McAfee EPO, IPS, IDS, Yara, Python, Ruby and/or Splunk
CISSP, CISM or related SANs certifications preferred
Active US government security clearance
Experience host-centric tools or other forensic software and techniques
Working knowledge of secure communication methods, including Secure Shell, SILC, and PGP / GPG
Strong oral and written communication skills
Previous hands on experience in the information security field
Previous hands on scripting or programming experience
Section 19 Job
YOU MUST BE ABLE TO SATISFY THE REQUIREMENTS OF SECTION 19 OF THE FEDERAL DEPOSIT INSURANCE ACT.
Apply to job
Send to friend
Save to cart
At GE, developing people is embedded in our culture and integral to our growth. Developing people is how we have succeeded across industries...