1+ months

Lead Cyber Fraud Analyst - 180932

Roseland, NJ 07068
Apply Now
Apply on the Company Site
  • Job Code
\u003Cp align=\u0022center\u0022\u003E\u003Cstrong\u003ELead Cyber Security / Fraud Analyst\u003C/strong\u003E\u003C/p\u003E \u003Cp\u003E\u003Cstrong\u003E*** Ideal candidates: 8 to 12\u002B years experience in technical security skills such as:\u003C/strong\u003E\u003C/p\u003E \u003Ctable style=\u0022margin-left: 5.65pt;width: 466.0px;border-collapse: collapse;\u0022 width=\u0022349\u0022\u003E \u003Ctbody\u003E \u003Ctr style=\u0022height: 15.0pt;\u0022\u003E \u003Ctd style=\u0022border: 1.0pt solid windowtext;padding: 0.0in 5.4pt;width: 205.625px;height: 15.0pt;\u0022\u003E \u003Cp\u003E* Incident Response\u003C/p\u003E \u003C/td\u003E \u003Ctd style=\u0022border: 1.0pt solid windowtext;padding: 0.0in 5.4pt;width: 228.625px;height: 15.0pt;\u0022\u003E \u003Cp\u003E* Intrusion Detection\u003C/p\u003E \u003C/td\u003E \u003C/tr\u003E \u003Ctr style=\u0022height: 15.0pt;\u0022\u003E \u003Ctd style=\u0022border: 1.0pt solid windowtext;padding: 0.0in 5.4pt;width: 205.625px;height: 15.0pt;\u0022\u003E \u003Cp\u003E* Endpoint Defense\u003C/p\u003E \u003C/td\u003E \u003Ctd style=\u0022border-left: none;border-right: 1.0pt solid windowtext;border-top: none;border-bottom: 1.0pt solid windowtext;padding: 0.0in 5.4pt;width: 228.625px;height: 15.0pt;\u0022\u003E \u003Cp\u003E* Malware Analysis\u003C/p\u003E \u003C/td\u003E \u003C/tr\u003E \u003Ctr style=\u0022height: 15.0pt;\u0022\u003E \u003Ctd style=\u0022border: 1.0pt solid windowtext;padding: 0.0in 5.4pt;width: 205.625px;height: 15.0pt;\u0022\u003E \u003Cp\u003E* Malicious Code\u003C/p\u003E \u003C/td\u003E \u003Ctd style=\u0022border-left: none;border-right: 1.0pt solid windowtext;border-top: none;border-bottom: 1.0pt solid windowtext;padding: 0.0in 5.4pt;width: 228.625px;height: 15.0pt;\u0022\u003E \u003Cp\u003E* CISSP, GCIA, GCIH, GREM\u003C/p\u003E \u003C/td\u003E \u003C/tr\u003E \u003C/tbody\u003E \u003C/table\u003E \u003Cp\u003E\u003Cstrong\u003EUnlock Your Career Potential: Global Security Organization at ADP\u003C/strong\u003E. Do you have a passion for going on the offensive to safeguard critical information? As ADP\u0027s \u003Cstrong\u003EGlobal Security Organization\u003C/strong\u003E (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you\u0027ll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.\u003C/p\u003E \u003Cp\u003E\u003Cstrong\u003EWe strive for every interaction to be driven by our CORE values:\u003C/strong\u003E Insightful Expertise, Integrity is Everything, Service Excellence, Inspiring Innovation, Each Person Counts, Results-Driven, - Social Responsibility.\u003C/p\u003E \u003Cp\u003E\u003Cstrong\u003EAvailable Locations:\u003C/strong\u003E\u003C/p\u003E \u003Cul\u003E \u003Cli\u003EOne ADP Drive, \u003Cstrong\u003EAugusta\u003C/strong\u003E, \u003Cstrong\u003EGA\u003C/strong\u003E 30909\u003C/li\u003E \u003Cli\u003E1 ADP Blvd/, \u003Cstrong\u003ERoseland\u003C/strong\u003E, \u003Cstrong\u003ENJ\u003C/strong\u003E 07068\u003C/li\u003E \u003C/ul\u003E \u003Cp\u003E\u003Cstrong\u003EPosition Summary:\u003C/strong\u003E\u003C/p\u003E \u003Cp\u003EProviding around-the-clock protection and \u003Cstrong\u003Ecyber defense\u003C/strong\u003E of ADP\u0027s global network of applications and data from threats from cyberspace is pivotal to the success of ADP\u0027s globally recognized brand and the continued growth of ADP\u0027s $10B market share.\u003C/p\u003E \u003Cp\u003E\u003Cstrong\u003ECIRC Information Security Analysts\u003C/strong\u003E execute highly effective processes to support advanced security threat monitoring, security incident investigations and forensic analysis. CIRC Analysts provide detection and response services for ADP worldwide across a broad set of security disciplines -- including \u003Cstrong\u003Ecyber operations, fraud prevention, physical security, and operational risk management.\u003C/strong\u003E Liaise with Legal, Privacy, Communications, Public Relations and the Business Units teams to triage any and all potential consumer, client or other reporting obligations related to incidents. Executes tests and verifies company response including the ability to rapidly gather information to enable an investigation and direct and effective response.\u003C/p\u003E \u003Cp\u003E\u003Cstrong\u003EResponsibilities:\u003C/strong\u003E\u003C/p\u003E \u003Cul\u003E \u003Cli\u003EMonitoring, managing, and coordinating the information collection and cataloging of activities from a variety of public and private security related information sources, as well as documenting the initial analysis of vulnerability reports and how they may relate to ADP Review various alerts from the intelligence sources and identify any indicators of attacks that may be focused on ADP or identify any activities from threat actors that may have an interest in ADP.\u003C/li\u003E \u003Cli\u003EConduct technical analysis and assessments of security related incidents, including malware analysis, packet level analysis, and system level forensic analysis. Conduct the analysis of network traffic and output from various network centric technologies. Analyze disk \u0026 memory images with the intent of recovering information related to a security incident. The analysis focus can include malicious or suspicious files, logs, registry entries or indications of lateral movement or data exfiltration.\u003C/li\u003E \u003Cli\u003ECoordination of incident response activities (escalations, notifications, conference calls, etc..) Monitoring all alerting systems, triage all collected information and escalate as necessary. Facilitate the escalation process and interactions with external teams. This includes prioritizing incidents during activity time frames and including advanced teams when necessary.\u003C/li\u003E \u003Cli\u003EAssist in the development and maintenance of new procedural documentation including newly developed correlation rules. This also includes the training of appropriate security analysts\u003C/li\u003E \u003Cli\u003EAssist in the development and maintenance of new procedural documentation including newly developed correlation rules based on the collection of data from external \u0026 internal intelligence sources, the validation of the data, and applying the context of the IOC data to ADP\u0027s threat \u0026 vulnerability exposure. This also includes the training of appropriate ADP security analysts on these additional IOC\u0027s.\u003C/li\u003E \u003Cli\u003EUtilizing the intelligence from our various sources, Define, build, test and implement correlation rules that support the monitoring and enforcement of the ADP security policies\u003C/li\u003E \u003Cli\u003EProvide leadership and/or mentoring of junior CIRC security analysts\u003C/li\u003E \u003Cli\u003ECollaborates effectively with cross-functional entities across the enterprise.(Skills \u0026 Abilities)\u003C/li\u003E \u003Cli\u003EOrganizational direction, time management, problem-solving, prioritization, goal setting, leadership and motivation, negotiation, interpersonal relations, verbal/written communications and human resource management. (Skills \u0026 Abilities)\u003C/li\u003E \u003Cli\u003EGeneral understanding of the client lifecycle functions, including sales, implementation and ongoing services.(Skills \u0026 Abilities)\u003C/li\u003E \u003Cli\u003ETravel \u0026lt;10%\u003C/li\u003E \u003C/ul\u003E \u003Cp\u003E\u003Cstrong\u003EQualifications Required:\u003C/strong\u003E\u003C/p\u003E \u003Cul\u003E \u003Cli\u003E\u003Cstrong\u003EB.S. Degree\u003C/strong\u003E in Computer Systems Engineering, Computer Science, Computer Information Systems or equivalent education and experience required. Specialized training in information security helpful.\u003C/li\u003E \u003Cli\u003E\u003Cstrong\u003ECISSP, GCIA, GCIH, GREM\u003C/strong\u003E or applicable experience in the Information Security field\u003C/li\u003E \u003Cli\u003E\u003Cstrong\u003E8 to 12 Years\u003C/strong\u003E Directly Related Experience\u003C/li\u003E \u003Cli\u003EThe Analyst must have a holistic understanding of the modern \u003Cstrong\u003Ephysical and cyber security landscape\u003C/strong\u003E. This position will be responsible for performing tasks related to the further development of our \u003Cstrong\u003Econverged SIEM monitoring platform \u003C/strong\u003Ewhich includes writing reports and correlation rules. The Analyst will primarily be responsible for analyzing advanced security related information from a variety of sources to create actionable intelligence from this disparate date within the SIEM platform. The candidate must have strong skills in conducting \u003Cstrong\u003Etechnical analysis of security threats\u003C/strong\u003E, as well as the ability to document and train individual members of the CIRC staff on new processes/procedures for other junior analysts to respond to in the SIEM platform.\u003C/li\u003E \u003Cli\u003E\u003Cstrong\u003ENetworking\u003C/strong\u003E \u003Cstrong\u003ESkills\u003C/strong\u003E - Strong experience in Windows and *nix environments. Excellent understanding of TCP/IP and network communications. Strong network administration skills. Packet-level behavioral familiarity with most major TCP/IP application protocols ( DNS, SMTP, HTTP, BGP, LDAP, IMAP, SSH, FTP, KRB5, DHCP, CIFS). General understanding of key components of internet architecture.\u003C/li\u003E \u003Cli\u003E\u003Cstrong\u003EIncident Handling\u003C/strong\u003E - Excellent computer security incident handling, analytical and communication skills. Familiarity with interpreting the log output of a wide selection of device classes including networking and host Infrastructure devices. In depth knowledge of computer security forensics and security vulnerabilities. Broad knowledge of business-impacting security scenarios and viable methods to detect these scenarios (Cross device log correlation)\u003C/li\u003E \u003Cli\u003E\u003Cstrong\u003EOperating Systems\u003C/strong\u003E - Strong systems administration skills. Conceptual knowledge of operating system internals (file handles, threads, semaphores, stack, heap, entry points). Implementation experience with general enterprise core service types (web/mail/dns/file servers)\u003C/li\u003E \u003Cli\u003E\u003Cstrong\u003ESecurity Tools \u0026 Technologies\u003C/strong\u003E - Well versed in multiple security technologies such as SIEM, DPI, GRC, Antivirus, Intrusion Detection Systems, HIPS, Web Proxy/Content Filtering, Active Directory, PKI, Radius, RSA SecureID\u003C/li\u003E \u003Cli\u003E\u003Cstrong\u003EMalware Analysis\u003C/strong\u003E - Reverse-engineering and executable analysis skills. Experience in reverse-engineering script content in multiple formats. Knowledge of how to operate a debugger. Knowledge of basic packing and obfuscation techniques. Broad knowledge of data and executable file types and extracting information from them. Functional knowledge of Shellcode fundamentals\u003C/li\u003E \u003Cli\u003E\u003Cstrong\u003EScripting/Development\u003C/strong\u003E - Enough SQL familiarity to generate nested queries and joins in a major SQL dialect. General experience with systems automation in a major scripting language. General knowledge of web content scripting languages. Functional experience with text and data representation and manipulation (XML, HTML, Regular Expressions, Wiki Markup, SQL)\u003C/li\u003E \u003C/ul\u003E \u003CP\u003E\u003Cdiv\u003E__________________\u003C/div\u003E \u003Cdiv\u003Ereq 180932\u003C/div\u003E \u003Cdiv\u003E#LITECH\u003C/div\u003E \u003Cdiv\u003E#LI-JT1\u003C/div\u003E\u003C/P\u003E \u003CP\u003EWe\u0027re designing a better way to work, so you can achieve what you\u0027re working for. Consistently named one of the \u0027Most Admired Companies\u0027 by FORTUNE\u00AE Magazine, and recognized by DiversityInc\u00AE as one of the \u0027Top 50 Companies for Diversity,\u0027 ADP works with more than 740,000 organizations across the globe to help their people work smarter, embrace new challenges, and unleash their talent. \u0022Always Designing for People\u0022 means we\u0027re creating platforms that will transform how great work gets done, so together we can unlock a world of opportunity.\u003C/P\u003E \u003CP\u003EAt ADP, we believe that diversity fuels innovation. ADP is committed to equal employment opportunities regardless of race, color, genetic information, creed, religion, sex, sexual orientation, gender identity, lawful alien status, national origin, age, marital status, or protected veteran status. We support an inclusive workplace where associates excel based on personal merit, qualifications, experience, ability, and job performance.\u003C/P\u003E
Posted: 2019-08-19 Expires: 2019-12-13

Featured Job

Featured Employer

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Lead Cyber Fraud Analyst - 180932

Roseland, NJ 07068

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast