Dec 062018

**Role Summary:**

This position will assess a defined area or environment within Security & Risk to determine gaps in performance or improvement opportunities within the Security & Risk organization. Under guidance, implements standards, procedures and improvements needed to maintain/improve area of responsibility. Executes assessments/changes and assists in defining, communicating and enforcing standards/procedures.

**Essential Responsibilities:**

In this role, you will:

+ Focuses on the physical protection of information systems assets, corporate information and intellectual property assets in order to prevent the intentional or inadvertent access, modification, disclosure, or destruction of those assets

+ Supports the development and maintenance of IT disaster recovery plans for critical systems

+ May liaise with crisis management, physical security, disaster recovery and other functions to ensure information security has the appropriate level of visibility to support the business continuity plans

+ Supports regular audits and assessments of existing user accounts, access rights, compliant hardware and software patch levels, as well as, suppliers, acquisitions/divestitures, internal businesses, and customers to ensure information policy adherence


+ Bachelor’s Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math) or equivalent

+ Strong professional experience in STEM related degree, Political Science/Government/International Affairs.

**Desired Characteristics:**

Technical Expertise:

+ Familiarity working in a SOC or in an incident response capacity, preferably within a Cloud Service Provider (CSP)

+ Understanding of working in a 24/7/365 SOC environment

+ Ability to triage events, demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly Demonstration of continuous learning as well as a good comprehension of emerging threats

+ Capabilities in offensive / defensive technologies and agile incident response focus will be critical to success

+ General knowledge of Digital Forensics & Investigative Response (DFIR), cyber security, threat detection, penetration testing (red/blue) and vulnerability management Working knowledge of TCP/IP communications and how common protocols and applications work at the network level, including DNS, HTTP, TLS, etc.

+ General knowledge of traditional SIEMs and security analytics platforms such as Splunk

+ Basic understanding of Network Security Monitoring practices, with direct hands-on experience with one or more NSM related technologies: Security Onion, Snort, Bro, Sguil, Surricata, Snorby, or similar

+ Basic understanding of host based detection and IR technologies such as McAfee EPO, OSSEC, Yara, MIR, CarbonBlack, Tanium, HBgary ActiveDefense or similar Experience with Python and object oriented software development practices in Python to drive process automation

+ Experience in Windows, Linux, and Unix operating systems

+ Must be willing to work off-shift hours, as needed during incidents

**About Us:**

GE (NYSE:GE) drives the world forward by tackling its biggest challenges. By combining world-class engineering with software and analytics, GE helps the world work more efficiently, reliably, and safely. GE people are global, diverse and dedicated, operating with the highest integrity and passion to fulfill GE’s mission and deliver for our customers.

**Locations:** Hungary; Budapest

click here for more details and apply to position

Tipical Questions
“What are your strengths and weaknesses?” It’s easy to talk about your strengths; you’re detail oriented, hard working, a team player, etc.–but it’s also easy to get tripped up when discussing your weaknesses, Teach says. Never talk about a real weakness unless it’s something you’ve defeated. “Many hiring managers are hip to the overused responses, such as, ‘Well, my biggest weakness is that I work too hard so I need try to take it easy once in a while.’ The best answer is to discuss a weakness that you’ve turned around, such as, you used to come in late to work a lot but after your supervisor explained why it was necessary for you to come in on time, you were never late again.”
Questions to ask
What skills and experiences would make an ideal candidate? This is a great open-ended question that will have the interviewer put his or her cards on the table and state exactly what the employer is looking for. If the interviewer mentions something you didn’t cover yet, now is your chance.