About Us: GE is the world's Digital Industrial Company, transforming industry with software-defined machines and solutions that are connected, responsive and predictive. Through our people, leadership development, services, technology and scale, GE delivers better outcomes for global customers by speaking the language of industry. GE offers a great work environment, professional development, challenging careers, and competitive compensation. GE is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.
Role Summary: You will be part of a dynamic, growing team, planning, preparing, hunting for, and responding to cyber incidents stemming from internal and external threat actors. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role within the Computer Incident Response Team.
Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM)
Perform daily response operations with a schedule that may involve nontraditional working hours
Write signatures, tune systems/tools, and develop scripts and correlation rules
Analyze host and network forensic artifacts and identify patterns and behaviors related to threat actors
Bachelors Degree in Information Technology or a similar field and/or 3 years Information Technology experience.
Minimum 1 year security-related experience, 2+ years preferred.
Cyber security related certifications preferred
Legal authorization to work in the U.S. is required.We will not sponsor individuals for employment visas, now or in the future, for this job.
Strong verbal and written communication skills
Basic understanding of APT, Cyber Crime and other associated tactics
Experience with endpoint detection and response (EDR) suites (McAfee EPO, OSSEC, Yara, MIR, CarbonBlack, Tanium, etc.)
Experience with host-centric tools for forensic collection and analysis (SleuthKit, Volatility Framework, FTK, Encase, etc.)
Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis)
Basic understanding of malware and reverse engineering (Dynamic and static analysis)
IT infrastructure background including familiarity with the following:
We are in the process of transitioning to an improved job application system and in the interim we are operating with two systems. Have your Job ID ready (from the email you received when you applied) to log in and check your application status.
Click the appropriate button. If you don't know your job ID, you can still check your status: use both buttons.