GE is the world's Digital Industrial Company, transforming industry with software-defined machines and solutions that are connected, responsive and predictive. Through our people, leadership development, services, technology and scale, GE delivers better outcomes for global customers by speaking the language of industry.
At GE Digital, we are creating technology and solutions to enable social, mobile, analytical and cloud capabilities for the Industrial Internet. The Industrial Internet is an open, global network that connects people, data and machines. It’s about making infrastructure more intelligent and advancing the industries critical to the world we live in. At GE, we believe it’s about the future of industry—energy, healthcare, transportation, manufacturing. It’s about making the world work better. GE is transforming itself to become the world's premier digital industrial company, executing critical outcomes for our customers. Explore how you can drive greater asset reliability, lower operating costs, reduce risk and accelerate operational performance with our Predix platform and software solutions. GE offers a great work environment, professional development, challenging careers, and competitive compensation. GE is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.
Role Summary: We are looking for a Senior Staff Incident Responder to join our dynamic team, driving efforts within the GE Digital Cyber Incident Management, Detection Operations to protect from cyber security threats facing the organization. This role includes the oversight, coordination, and management of incident response and remediation of Cyber Security incidents.
They are an information and cyber security Incident Manager driven to create and implement enterprise-class, product driven response strategies, with a focus on identifying and driving future-state direction of the Response Services program at global scale. The role includes the design & development of response capabilities and increased effectiveness, emphasizing on building well-integrated capabilities that span business environments and platforms (development, operations, cloud, mobile, etc.). The goal is to work through security incidents and find new ways to surface current and potential weakness elements to form a good defense strategy.
In this role they will also coordinate tactical and strategic business objectives, drive metrics and align with national and international standards. Demonstration of leadership abilities as well as a strong comprehension of emerging threats, defensive technologies and agile response methodologies is critical.
Bachelor's Degree in Computer Engineering or in a STEM major (Science, Technology, Engineering, or Math)
Minimum 8 years of professional IT experience
Minimum 4 years of experience with Network Security Monitoring, SIEM and/or response related activities, host-centric detection & response skills, or process automation
Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job
The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision-making skills to handle the often fast-paced role of an incident handler
Detailed understanding of APT, Cyber Crime and other associated tactics
Strong track record of understanding and interest in IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry
Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology
Experience with host based detection and prevention suites (McAfee EPO, OSSEC, Yara, MIR, CarbonBlack, Tanium, etc.)
Experience with host-centric tools for forensic collection and analysis (SleuthKit, Volatility Framework, FTK, Encase, etc.)
Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis)
Experience with malware and reverse engineering (Dynamic and static analysis)
Strong IT infrastructure background including familiarity with the following:
We are in the process of transitioning to an improved job application system and in the interim we are operating with two systems. Have your Job ID ready (from the email you received when you applied) to log in and check your application status.
Click the appropriate button. If you don't know your job ID, you can still check your status: use both buttons.