Role : Information Security Analyst
Location : San Antonio, TX
Project Duration: Contract 6+ Months
Purpose of Job:
Investigates, analyzes, and responds to suspicious behavior, attacks, and
security breaches within the environments using a variety of cyber defense
tools to identify and mitigate threats. Conducts log analysis and security
event triage. Stays current with latest information security threats, exploits,
trends, and intelligence.
Job Requirements:
Maintains awareness of the latest critical information security
vulnerabilities, threats, and exploits.
Assists in conducting routine security event triage and log analysis.
Monitors networks, systems, and applications for routine to moderately
complex suspicious behavior (includes Insider Threat), attacks, and security
breaches.
Assists in responding to cyber incidents, performing moderately complex
analysis using security tools. Builds knowledge, understanding, and experience
of disparate skills (e.g. networking, servers, coding, etc.) to figure out the
malicious actor’s tactics, techniques and procedures.
Assists with conducting routine forensic analysis of comprised systems and
determination of consequences.
Under direct supervision, uses the discoveries from the incident response
process to suggest basic improvements to existing detection capabilities and
security controls.
Documents findings of completed alerts.
Assists with writing up findings on incidents.
Minimum Requirements:
Bachelor’s Degree OR 4 additional years of related experience beyond the
minimum required may be substituted in lieu of a degree.
2 or more years of related experience in Information Security and/or
Information Technology to include accountability for moderately complex tasks
and/or projects.
Developing knowledge of function/discipline and demonstrated application of
knowledge, skills and abilities towards work products.
Developing level of business acumen in the areas of business operations,
industry practices and emerging trends.
Preferred :
Experience in the technology and process of incident response, security event
management, and log analysis
Experience in disciplined blue team operations
Experience researching emerging cyber threats to understand and present
hacker methods and tactics, system vulnerabilities, and indicators of compromise
Experience investigating, capturing, and analyzing events related to cyber
incidents
Experience planning and directing recovery activities including forensic
event analysis, and malware evidence collection and reverse engineering
Experience monitoring web proxy, email security, Web Application Firewall,
Data Loss Prevention and Cloud Access Security Broker technology
Experience in system administration applied to planning and researching and
developing security policies, standards, and procedures across multiple
platforms and applications
Experience applying security principles, methodologies, and controls to new
and emerging technology
Specific platform/software experience needed:
Phantom, ELK stack (Elastic, Logstash, Kibana), FireEye HX, Cylance Protect
and Optics, Bluecoat ProxySG/MAA/CAS, Proofpoint, Powershell, VB Script (in
order to analyze macro code), knowledge of the TCP/IP protocol suite
—
Reference : Information Security Analyst jobs
Source: http://jobrealtime.com/jobs/technology/information-security-analyst_i3658