MoveTheWorldForwardTogether

When you join Verizon

Verizon is a leading provider of technology, communications, information and entertainment products, transforming the way we connect across the globe. We’re a diverse network of people driven by our ambition and united in our shared purpose to shape a better future. Here, we have the ability to learn and grow at the speed of technology, and the space to create within every role. Together, we are moving the world forward – and you can too. Dream it. Build it. Do it here.

What you’ll be doing...

At Verizon we believe technology should help you achieve more. And we help businesses do exactly that almost daily — co-creating innovative connected products, rapidly and securely deploying apps in the cloud, managing employee-owned devices on a global scale, and deflecting sophisticated hacker attacks. In support of our world leading position in Cyber Security, we have recently launched a new service, the Computer Emergency Response Team (CERT).


Our newly offered service will constitute of a designated CSIRT Consultant full time or as a shared resource, who will work as a contact and communications point between our security services team and customers’ security and IT staff as well as users and other important stakeholders. You will also be responsible for operating the incident management process in accordance with the procedures designed in cooperation with customer. On a day to day basis, you will assist with, identify and respond to incidents as well as proactively propose improvements for how to reduce risk and potential future incidents.

  • Receiving and monitoring incident information from our managed security services and other sources.
  • Reviewing the collected incident data and confirming or rejecting incidents based on the analysis.
  • Classifying and prioritizing incidents based on established criteria.
  • Facilitating communication between stakeholders of the incident status.
  • Coordinating the containment effort based on the available information and established processes.
  • Performing vulnerability management using the Qualys tool.
  • Making containment decisions and facilitating decision making by other parties using established escalation processes.
  • Communicating with affected users and stakeholders to organize the containment effort.
  • Verifying the effectiveness of containment actions taken.
  • Identifying the attack vector used by incident and taking actions to confirm that similar incidents are prevented in the future.
  • Validating the effectiveness of the eradication actions.
  • Coordinating forensics and law enforcement activities with officials as necessary.
  • Coordinating the recovery actions, and confirming recovery effort success.
  • Confirming that all temporary containment efforts have been removed.
  • Updating stakeholders on the status of the recovery effort, and conducting root cause analysis for the incident.
  • Communicating the results of the root cause analysis to the customer and stakeholders to prevent similar incidents in the future.
  • Analyzing the incident response effort, with feedback from the customer and third parties.
  • Identifying and analyzing any mistakes as well as good decisions made during the response process.
  • Using the results of the analysis as an input for improvements, such as incident response.
  • Conducting proactive management of the Monitoring and Analytics solution.
  • Helping develop operational metrics to illustrate risk reduction over time.
  • Being a SPOC in case of technical escalations.

    What we’re looking for...

    You'll need to have:

    • Bachelor's degree or relevant work experience.
    • Knowledge of Network and Web Application vulnerability assessments.
    • Experience in Security incident detection or Security incident management.
    • Willingness to travel.

    Even better if you have:

    • Strong problem-solving and security analytics skills and the ability to identify gaps in processes and recommend improvements for mitigation.
    • CSIRT experience, SIEM (SPLUNK) and log analytics skills.
    • Experience structuring and operating an efficient Incident Response process.
    • Knowledge of common types of malware, their infection vectors, how to identify them using network and host based tools, and how to eradicate them and verify the success of eradication efforts.
    • Knowledge of current security threats and vulnerabilities and how to detect and mitigate them, and the ability to understand their possible consequences on the customer’s environment.
    • Understanding of modern technologies used to detect malware and vulnerabilities and protect assets.
    • SANS or other Security certifications, such as GCIA, GCIH, GREM, GPEN, CEH.

    Moving the world forward together

    Our credo is at the core of the
    V team culture.  

    Perks that work for you

    View our benefits

    Learn more

    Explore more about Consulting jobs

    Your Careers Account

    Create / update your career account