What are the responsibilities and job description for the Senior Associate, Information Security (Incident Response) position at Publicis Groupe Holdings B.V?
Overview
The Senior Associate, Information Security is part of a global team and is responsible for incident response of cyber security incidents that are associated with our businesses, clients, and vendors; is technically skilled and ensures incident containment, remediation, and closure. This individual will be expected to work closely with the legal, data privacy, business, and client teams. They should be comfortable with interacting with senior executives including C-level staff.
Responsibilities
- Lead investigation of cyber security incidents of higher severity
- Analyze compromised/potentially compromised systems
- Coordinate evidence/data gathering and document security incident reports
- Manage, review and present written and oral reports in a pertinent, concise, and accurate manner for distribution to management
- Maintain security processes such as application security, vulnerability management and incident response
- Maintain current knowledge of tools and best practices in advanced persistent threats, tools, techniques, procedures of attackers, forensics, and incident response
- Perform complex forensic investigations into system breaches, data leaks, and system weaknesses
- Provide technical expertise to staff on security incident monitoring, triage, response, threat & vulnerability management, and security analysis
Provide strategic direction on types of Incident Management activities that will drive efficiencies across company
Qualifications
- 4 or more years of experience in an analytical role of either network forensics analyst, threat analyst, incident response or security engineer/ consultant
- Experience developing and managing incident response programs
- Strong working expertise in Linux, Windows, and MacOS systems
- Expertise in analysis of TCP/IP network communication protocols
- Proficient in EDR - CrowdStrike and/or SentinelOne
- Experience conducting analysis of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operations
- Knowledge of advanced computer exploitation methodologies
- Proficient in social engineering, phishing, log analysis, system administration
- Understanding of real-world exploits work, how offensive attackers laterally move between internal systems and to establish persistence
- Strong general knowledge of security concepts and expertise in network and web application security issues
- Experience with a scripting language such as Perl, Python, or other scripting language in an incident handling environment
- Experience on forensic investigation tools such as: EnCase, FTK, Sleuthkit, Kali Linux
Additional information