Thursday, 14 February 2019

Information Security Analyst

Role : Information Security Analyst Location : San Antonio, TX Project Duration: Contract  6+ Months   Purpose of Job: Investigates, analyzes, and responds to suspicious behavior, attacks, and security breaches within the environments using a variety of cyber defense tools to identify and mitigate threats. Conducts log analysis and security event triage. Stays current with latest information security threats, exploits, trends, and intelligence.   Job Requirements:   Maintains awareness of the latest critical information security vulnerabilities, threats, and exploits. Assists in conducting routine security event triage and log analysis. Monitors networks, systems, and applications for routine to moderately complex suspicious behavior (includes Insider Threat), attacks, and security breaches. Assists in responding to cyber incidents, performing moderately complex analysis using security tools. Builds knowledge, understanding, and experience of disparate skills (e.g. networking, servers, coding, etc.) to figure out the malicious actor's tactics, techniques and procedures. Assists with conducting routine forensic analysis of comprised systems and determination of consequences. Under direct supervision, uses the discoveries from the incident response process to suggest basic improvements to existing detection capabilities and security controls. Documents findings of completed alerts. Assists with writing up findings on incidents.   Minimum Requirements:   Bachelor's Degree OR 4 additional years of related experience beyond the minimum required may be substituted in lieu of a degree. 2 or more years of related experience in Information Security and/or Information Technology to include accountability for moderately complex tasks and/or projects. Developing knowledge of function/discipline and demonstrated application of knowledge, skills and abilities towards work products. Developing level of business acumen in the areas of business operations, industry practices and emerging trends.   Preferred :   Experience in the technology and process of incident response, security event management, and log analysis Experience in disciplined blue team operations Experience researching emerging cyber threats to understand and present hacker methods and tactics, system vulnerabilities, and indicators of compromise Experience investigating, capturing, and analyzing events related to cyber incidents Experience planning and directing recovery activities including forensic event analysis, and malware evidence collection and reverse engineering Experience monitoring web proxy, email security, Web Application Firewall, Data Loss Prevention and Cloud Access Security Broker technology Experience in system administration applied to planning and researching and developing security policies, standards, and procedures across multiple platforms and applications Experience applying security principles, methodologies, and controls to new and emerging technology   Specific platform/software experience needed:   Phantom, ELK stack (Elastic, Logstash, Kibana), FireEye HX, Cylance Protect and Optics, Bluecoat ProxySG/MAA/CAS, Proofpoint, Powershell, VB Script (in order to analyze macro code), knowledge of the TCP/IP protocol suite       --
Reference : Information Security Analyst jobs

source http://cvwing.com/jobs/technology/information-security-analyst_i4709

No comments:

Post a Comment