Position: IT Security Analyst (Remote)
Location: Columbia, SC 29210 - Remote
Term: 5 months
Day-to-Day Responsibilities:
Location: Columbia, SC 29210 - Remote
Term: 5 months
Day-to-Day Responsibilities:
-
Performs network security monitoring, security event triage, and incident response for a mid-size organization, coordinates with other team members, and management to document and report incidents.
-
He/she will be part of rotating SOC shifts supporting 24/7 coverage. Nights and weekends can be performed remotely after sufficient training and familiarization.
-
Maintains records of security events investigated and incident response activities, utilizing case management and ticketing systems.
-
Monitors and analyzes Intrusion Detection Systems (IDS), Security Orchestration Automation Response (SOAR) alerts, and Security Information and Event Management (SIEM) to identify security issues for remediation.
-
Makes recommendations, creates, modifies, and updates Intrusion Detection Systems (IDS) and Security Information Event Management (SIEM) tool rules.
-
Ensure that we are implementing best practice security policies that address the client's business need while protecting their vital corporate assets.
-
Take on Security Operations responsibilities when not on a SOC shift: This includes but is not limited to vulnerability scanning.
-
Apply and retain learned knowledge across key lines of business, including products, practices, and procedures.
-
Attend and fully engage in team and customer meetings.
-
Become a deep technical resource that earns our customer’s trust.
-
Innovate on behalf of customers; translate your thoughts into action yielding measurable results.
-
This is a customer-facing role in a hybrid delivery model.
-
Other continuous education and training in the security field.
Is this a good fit? (Requirements):
-
BS/BA degree in Computer Science, Information Systems, or related discipline or equivalent experience.
-
1 – 3 years of professional work experience in Security Operation Security (SOC).
-
Experience working with common security tools and products.
-
Ability to work in a team environment with a proven history of being able to collaborate successfully with team members.
-
Knowledge of Runbooks, Playbooks and following Standard Operating Procedures.
-
Strong analytical skills to define risk, identify potential threats and develop action/mitigation plans.
-
Strong interpersonal skills, ability to mentor/train staff and bring awareness to current and emerging threats.
-
Strong written and verbal communication skills with an ability to present technical risks and issues to non-technical audiences.
-
Proven ability to multitask, thrive, and prioritize responsibilities in a fast-paced environment.
Even better if you have:
-
Firewalls (e.g. Palo Alto Networks, Checkpoint, Cisco ASA, Juniper SSG,pfSense, etc..) experience.
-
Log Management and SIEM (e.g. Splunk, IBM QRadar, HP ArcSight) experience.
-
Network Analysis Tools (e.g. NetWitness, Wireshark) experience.
-
Analyzing Phishing Emails experience.
-
Endpoint Security (e.g. Carbon Black Enterprise Protection, Carbon Black Enterprise Response, Symantec, McAfee, Forefront) experience.
-
Various Open-Source security and networking tools experience. (MRTG, SysInternals, Whatsup Gold)
System Analysis and Forensic Tools (e.g. FTK, EnCase) experience.
SOAR Platforms (e.g. Siemplify, Resilient) experience.
Linux OS and scripting skills. OSX and Windows skills. -
Cyber Security Certifications: Security +, CySa+, CASP, SAN GIAC Certifications (GCIH, GPEN, GSEC, etc.), etc.