This position will assess a defined area or environment within Security & Risk to determine gaps in performance or improvement opportunities within the Security & Risk organization. Under guidance, implements standards, procedures and improvements needed to maintain/improve area of responsibility. Executes assessments/changes and assists in defining, communicating and enforcing standards/procedures.
In this role, you will:
+ Focuses on the physical protection of information systems assets, corporate information and intellectual property assets in order to prevent the intentional or inadvertent access, modification, disclosure, or destruction of those assets
+ Supports the development and maintenance of IT disaster recovery plans for critical systems
+ May liaise with crisis management, physical security, disaster recovery and other functions to ensure information security has the appropriate level of visibility to support the business continuity plans
+ Supports regular audits and assessments of existing user accounts, access rights, compliant hardware and software patch levels, as well as, suppliers, acquisitions/divestitures, internal businesses, and customers to ensure information policy adherence
+ Bachelor’s Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math) or equivalent
+ Strong professional experience in STEM related degree, Political Science/Government/International Affairs.
+ Familiarity working in a SOC or in an incident response capacity, preferably within a Cloud Service Provider (CSP)
+ Understanding of working in a 24/7/365 SOC environment
+ Ability to triage events, demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly Demonstration of continuous learning as well as a good comprehension of emerging threats
+ Capabilities in offensive / defensive technologies and agile incident response focus will be critical to success
+ General knowledge of Digital Forensics & Investigative Response (DFIR), cyber security, threat detection, penetration testing (red/blue) and vulnerability management Working knowledge of TCP/IP communications and how common protocols and applications work at the network level, including DNS, HTTP, TLS, etc.
+ General knowledge of traditional SIEMs and security analytics platforms such as Splunk
+ Basic understanding of Network Security Monitoring practices, with direct hands-on experience with one or more NSM related technologies: Security Onion, Snort, Bro, Sguil, Surricata, Snorby, or similar
+ Basic understanding of host based detection and IR technologies such as McAfee EPO, OSSEC, Yara, MIR, CarbonBlack, Tanium, HBgary ActiveDefense or similar Experience with Python and object oriented software development practices in Python to drive process automation
+ Experience in Windows, Linux, and Unix operating systems
+ Must be willing to work off-shift hours, as needed during incidents
GE (NYSE:GE) drives the world forward by tackling its biggest challenges. By combining world-class engineering with software and analytics, GE helps the world work more efficiently, reliably, and safely. GE people are global, diverse and dedicated, operating with the highest integrity and passion to fulfill GE’s mission and deliver for our customers. www.ge.com
**Locations:** Hungary; Budapest