GE is an equal opportunity employer, offering a great work environment, challenging career opportunities, professional training and competitive compensation.
The Corporate Information Security - Lead Incident Analyst will primarily work within established operating procedures to respond and contain cyber incidents. The Lead Incident Analyst will also be responsible for leading and working on projects that will support tactical and strategic business objectives. A strong comprehension of IR technologies, malware, emerging threats as well as leadership abilities in a large corporate environment will be critical to success.
Collaborate with team members as well as other Business Units, business partners, management, vendors, and external parties as needed
Appropriately respond to any corporate incidents and ensure containment based on severity level, coordinate live response data captures with GE CIRT
Perform daily response operations, with a schedule that may involve nontraditional working hours
As requested, deliver appropriate and accurate metrics to management
Lead small to medium size projects as directed by management, work independently when necessary and be self-directed when appropriate
Work with a globally distributed team and rely heavily on electronic communication
Understand active threats against the corporate IT systems and coordinates with cyber intelligence teams
Bachelor’s Degree in Computer Science or a related technical degree, (or minimum 4 years of IT experience)
Minimum 2 years of experience handling incidents and / or experience with host-centric detection and response skills
Due to U.S. Government restrictions to certain types of technology and technical data involved with this position as well as the need to periodically visit domestic military bases to consult with DoD personnel on extranet tools, this position is limited to U.S. Citizens
Additional Eligibility Qualifications
GE will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a background investigation and drug screen.
Experience host-centric tools or other forensic software and techniques
Ability to identify compromised computers using logs, live response, and related computer centric evidence sources
Working knowledge of secure communication methods, including Secure Shell, SILC, and PGP/GPG
Programming and / or scripting skills
Ability to speak confidently when dealing with internal constituents
Strong oral and written communication skills
CISSP, CISM or related SANs certifications preferred
Active US government security clearance
Strong IT infrastructure background
Section 19 Job
YOU MUST BE ABLE TO SATISFY THE REQUIREMENTS OF SECTION 19 OF THE FEDERAL DEPOSIT INSURANCE ACT.
Apply to job
Send to friend
Save to cart
At GE, developing people is embedded in our culture and integral to our growth. Developing people is how we have succeeded across industries...