Information Security Analyst

Role : Information Security Analyst

Location : San Antonio, TX
Project Duration: Contract  6+ Months

 

Purpose of Job:

Investigates, analyzes, and responds to suspicious behavior, attacks, and
security breaches within the environments using a variety of cyber defense
tools to identify and mitigate threats. Conducts log analysis and security
event triage. Stays current with latest information security threats, exploits,
trends, and intelligence.

 

Job Requirements:

 

Maintains awareness of the latest critical information security
vulnerabilities, threats, and exploits.

Assists in conducting routine security event triage and log analysis.

Monitors networks, systems, and applications for routine to moderately
complex suspicious behavior (includes Insider Threat), attacks, and security
breaches.

Assists in responding to cyber incidents, performing moderately complex
analysis using security tools. Builds knowledge, understanding, and experience
of disparate skills (e.g. networking, servers, coding, etc.) to figure out the
malicious actor’s tactics, techniques and procedures.

Assists with conducting routine forensic analysis of comprised systems and
determination of consequences.

Under direct supervision, uses the discoveries from the incident response
process to suggest basic improvements to existing detection capabilities and
security controls.

Documents findings of completed alerts.

Assists with writing up findings on incidents.

 

Minimum Requirements:

 

Bachelor’s Degree OR 4 additional years of related experience beyond the
minimum required may be substituted in lieu of a degree.

2 or more years of related experience in Information Security and/or
Information Technology to include accountability for moderately complex tasks
and/or projects.

Developing knowledge of function/discipline and demonstrated application of
knowledge, skills and abilities towards work products.

Developing level of business acumen in the areas of business operations,
industry practices and emerging trends.

 

Preferred :

 

Experience in the technology and process of incident response, security event
management, and log analysis

Experience in disciplined blue team operations

Experience researching emerging cyber threats to understand and present
hacker methods and tactics, system vulnerabilities, and indicators of compromise

Experience investigating, capturing, and analyzing events related to cyber
incidents

Experience planning and directing recovery activities including forensic
event analysis, and malware evidence collection and reverse engineering

Experience monitoring web proxy, email security, Web Application Firewall,
Data Loss Prevention and Cloud Access Security Broker technology

Experience in system administration applied to planning and researching and
developing security policies, standards, and procedures across multiple
platforms and applications

Experience applying security principles, methodologies, and controls to new
and emerging technology

 

Specific platform/software experience needed:

 

Phantom, ELK stack (Elastic, Logstash, Kibana), FireEye HX, Cylance Protect
and Optics, Bluecoat ProxySG/MAA/CAS, Proofpoint, Powershell, VB Script (in
order to analyze macro code), knowledge of the TCP/IP protocol suite

 

 

 

Reference : Information Security Analyst jobs
Source: http://jobrealtime.com/jobs/technology/information-security-analyst_i3658

Leave a comment