We are currently seeking a Sr. Analyst of Cyber Security & Incident Response! This position will collaborate with the Manager of CSIR: Cyber Security & Incident Response. The Sr. Analyst of Cyber Security & Incident Response will be responsible for the management, deployment, and continuous improvement of the tools and processes demonstrated by the CIRT!The Sr. Analyst of Cyber Security & Incident Response is a guide in the field of security incident response. Successful candidates typically have 5-7 years of information security experience with solid focus on Incident Response as well as technical certifications to reinforce their practical experience. The Sr. Analyst of Cyber Security & Incident Response has strong coordination, communication, and teamworks skills as well as a good technical and architectural understanding. On a day-to-day basis the Sr. Analyst of Cyber Security & Incident Response will assist with identifying and responding to incidents as well as conducting research and development in cyber security to proactively propose improvements for how to reduce risk and strengthen the security posture of Anywhere and our ability to respond to cyber-attacks.Responsibilities:Maintain a functional Cyber Incident Response lab that is crafted to safely and accurately aid the team's ability to analyze threats to Anywhere.Independently lead computer incident investigations, resolving cause of the security incident and preserving evidence for potential legal action.Leverage, implement, and fine tune Incident Response tools demonstrated by Anywhere to proactively seek for indications of compromise.Backup the CIRT Manager and be the Technical CIRT Commander when needed, and or by rotation. When acting as the CIRT Commander this role will be encouraged to Lead the response to Cyber Security threats and incidents for the collection, analysis, and preservation of digital evidence.Implement, develop, and document Incident Handling GuidesConduct in-depth analysis of cyber threat data to include: identification of active security threats, development of new analytic methods, reverse engineering of malicious code, and documenting and transitioning results in reports and presentations.Qualifications:Minimum 5-7 years of experience in Information SecurityBachelor of Science Degree with a concentration in Computer Science, or Information Technology, or equivalent prior work experience in a related field.One or more industry certifications (or achieve within 6 months):CISSP, GCED, CEH, GCIH, GCFA, GCFE, etc.Expert in Endpoint Detection & Response tools, preferably CrowdStrike.Proficient in Windows OS, including Firewall, Registry, Group/Local Policy, and Active Directory.Expert in Splunk and SPL writing.Experience in Vulnerability Assessment, IDS/IPS, E-Mail security, Firewalls, TCP/IP, Log analysis, and IT standards.Knowledgeable in Information Security products (Forensics, EDR, IDPS, HIPS, SIEM).Extensive understanding of operating systems, network security, and protocol analysis.Proficient in scripting (Perl, Python, VBScript, PowerShell, C++).Proficient in transactional data processing (Transact-SQL, MySQL, Oracle, GREP, REGEX, SPL).Familiar with web development (HTML, XML, PHP, Java, .NET).Familiar with disassembly and reverse engineering using tools like IDA Pro, W32Dasm, Capstone.Familiar with Pen Testing techniques and tools (Kali Linux, Pass the hash, hashcat, Metasploit).Understanding of incident response methodologies.Knowledgeable in the life cycle of network threats, attacks, and exploitation methods.Strong analytical skills and creative thinking in security operations.Willingness to participate in on-call rotation for emergency cybersecurity situations.#LI-DH2#LI-Remote#Dice#AnywhereEngineersExciting News:EEO Statement:EOE AA M/F/Vet/DisabilityCompensation Range:The base salary for this position is $97,000 to $132,000.