Senior Incident Response Consultant - 1351073

January 18, 2022 - Texas, USA, Remote | WFH

What You’ll Do

The Cisco Talos Senior Incident Response Consultant will work Cisco customers, using established methodologies, to perform a variety of reactive and proactive Incident Response related activities. These may include emergency investigations of cyber incidents, threat intelligence research, proactively hunting for adversaries in customer environments, designing and performing Table-Top Exercises, performing IR Readiness Assessments, and teaching an immersive Cyber Range workshop. The Senior Incident Response Consultant will also be responsible for leading and working on projects that will support tactical and strategic business objectives for customers. Demonstration of leadership abilities, clear and concise communication with a variety of stakeholders, ability to lead during a crisis, personal agility to adapt to changing environments, and a strong comprehension of adversary behavior, malware, emerging threats, and calculating risk.

Who You’ll Work With

When you work with us, you’ll be part of a global team of highly empowered Incident Response and Cyber Threat Intelligence professionals who work as a collaborative team focused on helping our clients be both better prepared to defend against adversaries on their network, as well as responding to active incidents within their network.

Who You Are

Both your clients and your colleagues consider you a charismatic, articulate individual, and a born diplomat. You check your ego at the door and learn from others constantly, while also helping to educate those who aren’t as well versed as you are in technical or procedural topics. As a result, you have a track record of working tirelessly to help your clients and teammates and have even come up with some novel techniques in your time. You are willing to routinely travel with less than 24-hour notice, up to 20% of the time.

Required Skills

  • Investigate and respond to global cyber incidents caused by internal and external threats to our customers, that may involve nontraditional working hours.
  • Can clearly communicate the Incident Response Lifecycle and the Kill Chain (Attack) Life Cycle.
  • Familiarity with the MITRE ATT&CK framework, and how this can be used to translate findings into intelligence and countermeasures.
  • Demonstrate capability to map technical findings to business impacts and communicate those in a manner which is understandable by a non-technical audience.
  • Working capability or expertise with understanding of host centric analysis using a variety of forensic tools (e.g. EDR, X-Ways, Volatility, Cisco Secure Endpoint, Velociraptor, etc.).
  • Working capability or expertise with network forensic analysis with an understanding of how to use network telemetry to assist with an investigation.
  • Be able to scope an incident, gain consensus on objectives with customers, and lead a team of incident response consultants during an emergency engagement.
  • Ability to design, lead, and participate in Incident Response Table-Top Exercises with customers.
  • Comfort with conducting proactive threat hunting for adversaries on customer environments, leveraging a variety of tools and techniques.
  • Lead and perform Incident Response Readiness Assessments for customers.
  • Collaboratively draft communications, assessments, and reports that may be both internal and customer facing.
  • Understanding of different attacks and how best to design custom detection, containment, and remediation plans for customers.
  • Will serve as a liaison to different customers and interface with fellow team members and colleagues on other security teams. As needed, manage relationships with business partners, management, vendors, and external parties.
  • Lead projects as directed.
  • Be a champion for the process. Develop and document processes to ensure consistent and scalable response operations.
  • Demonstrate industry leadership through blog posts and public speaking at conferences and events.
  • Bachelors’ Degree in Computer Science or a related technical degree; or equivalent industry experience.
  • Minimum 5 years of experience in information security and 4 years of experience handling incidents.
  • Must be willing to be on-call and work off-shift hours, to include nights, weekends, and holidays.

Desired Characteristics:

  • Detailed understanding of current cyber security threats, attacks, and countermeasures. Such as Ransomware, Cyber Crime, Hacktivism, and associated tactics
  • Strong track record of understanding and interest in recognized IT Security-related standards and technologies, demonstrated through training, job experience and/or industry activities.

IT Security Certifications

Industry certifications such as the CISSP, CISM, CISA, GCIH, CFCE, GCFA, GNFA, and/or GCFE.

Why Cisco Talos IR

We always strive to do the right thing, for our team, for our customers, and for the world!

Why Cisco

We connect everything: people, processes, data, and things. We innovate everywhere, taking bold risks to shape the technologies that give us smart cities, connected cars, and handheld hospitals. And we do it in style with unique personalities who aren’t afraid to change the way the world works, lives, plays and learns. We celebrate the creativity and diversity that fuels our innovation. We are dreamers and we are doers.

Cisco requires all U.S. employees to be fully vaccinated or have an approved religious or medical accommodation. Candidates accepting an offer must provide proof of vaccination status on their first day. If someone anticipates requesting an accommodation for this requirement, they must receive approval before the start date. Candidates receiving an offer will receive additional information about the accommodation process at the time of the offer. All offers of employment are contingent upon complying with Cisco’s vaccination policy.