Job ID :
Company :
Internal Postings
Location :
Type :
Duration :
6+ Months
Salary :
Status :
Openings :
Posted :
15 May 2018
Job Seekers, Please send resumes to
My customer, an international organization located in Washington, DC, has a 6+ month contract position available for an Information Security Analyst.

Position Overview:

The Office of Information Security (OIS) ensures that security efforts throughout the World Bank Group are coordinated and aligned with the Bank's business and IT strategy. This Office delineates the client's information security plans and ensures, in coordination with the Information Security Council, that resources and all implementation of plans, procedures, and standards are reviewed, supported, and deployed in the most effective and efficient manner and are consistent with overall risk management. The Office of Information Security needs a suitable resource to support the Incident Response functions. The Information Security Analyst will be expected to review logs from various security monitoring tools, analyze and triage the incident data, determine the impact of the incident, and act appropriately to limit the damage and restore normal services. The Information Security Analyst needs to have a strong understanding of Networking and Operating systems concepts in order to triage the incident. She/he will also be responsible for generating tickets in the ticketing system and following the appropriate workflow. The Information Security Engineer will also be responsible for the production of adhoc reports and other ad hoc tasks, as assigned by the Team Lead.

Essential Job Functions:
  • Monitor Security Events from IDS, SIEM, etc.
  • Log tickets to the Ticketing System
  • Handle calls from the MSSP(Managed security service provider, users regarding incidents/events, perform triage, resolve problems, or escalate to team members
  • Perform triage on alerts from all sources including Monitored Email Distribution Lists
  • Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
  • Produce ad hoc reports and other ad hoc tasks
Educational Qualifications and Experience:
  • Education: Bachelor's degree in Computer Science or Information Systems
  • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
  • Experience with Firewalls and information security technologies
  • Experience with CERT/CSIRT/CIRT/SOC
Certification Requirements:
  • CEH, Security +, CCNA
Required Skills/Abilities:
  • Monitoring skills related to IDS and SIEM
  • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
  • Understanding of Windows Registry, File system, etc.
  • Hands-on knowledge of Network Packet Analysis using tools
  • Ability to work with team members with varying levels of technical skills and diverse international backgrounds
  • Strong understanding of Networking and Operating systems concepts
  • Ability to adapt to and function in a project environment with multiple timetables and changing priorities
  • Ability to learn new concepts and approaches in Analyzing Security Incidents.
  • Good communication skills (Verbal and Written)
Desired Skills/Abilities (not required but a plus):
  • Pluses for Levels: (level II, III)
    • Level II
Essential Job Functions:
  • Carry out detailed Incident Response activities, including containment, remediation, and root cause analysis
Educational Qualifications and Experience:
  • Bachelor's degree and 5+ years of information security experience
  • Experience in malware remediation and containments
  • Hands on experience of Incident Response /Malware analysis
Desired Skills/Abilities:
  • Malware Analysis
  • Cyber Forensics (Memory, Disk)
  • Scripting Languages e.g. Python
Preferred Certifications:
  • GIAC
  • Level III
Essential Job Functions:
  • Perform advanced Malware Analysis, along with Incident Response
  • Generate detailed Malware Analysis reports on PE and other common file structure samples
  • Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis
  • Assist OIS in Identifying zero-day/vulnerable applications and impact
Educational Qualifications and Experience:
  • Master's degree and 7 + years of work experience
  • Experience with Malware Analysis of PE and other common file structures
Desired Skills/Abilities:
  • Expert understanding of Windows API calls
  • Expert knowledge of Debuggers and disassemblers
  • Scripting language knowledge.