Cybersecurity Analyst from System One
Tulsa, OK 74119
About the Job
System One has two new exciting job opportunities for an energy company located in Tulsa! We are looking for 2 cybersecurity analysts - one has a 2nd-shift schedule (3:00 p.m. - 1:00 a.m.) and the other has a 3rd-shift schedule (11:00 p.m. - 9:00 a.m.) and will consist of 4 days per week, 10-hour shifts. The ideal candidate will have a minimum of 2 years of experience in incident response and 3 years of experience in general cybersecurity.
Cybersecurity System Monitoring:
Monitor systems for alarms, notifications of possible malicious email, or other activity. Analyze available data along with known Indicators of Compromise, Threat Intelligence Feeds, and other sources of information for possible malicious activity.
Incident Response:
What you need:
Cybersecurity System Monitoring:
Monitor systems for alarms, notifications of possible malicious email, or other activity. Analyze available data along with known Indicators of Compromise, Threat Intelligence Feeds, and other sources of information for possible malicious activity.
Incident Response:
- Participate as a member of the company's Cybersecurity Incident Response Team.
- Ensure appropriate response actions are taken to resolve the incident.
- Ensure all actions taken are properly documented in accordance with standards.
- Participate in the Root Cause Analysis effort after the incident is resolved.
What you need:
- Proven success in an operational security capacity, to include but not limited to: Incident Response, Network Security Monitoring, Troubleshooting, Forensics, Systems Risk Analysis, Penetration Testing, and related areas.
- Experience with one or more of the following systems/technologies: SIEM, Intrusion Detection/Protection Systems, Next Generation Firewall, Endpoint Protection and Remediation, Vulnerability Management, Application Whitelisting, Network Packet Inspection, Email Security Systems, or related.
- Working knowledge of networking concepts, analysis of network packet captures, boundary protection, and related security issues.
- Working knowledge of operating systems (Windows and Linux), applications, logging, virtualization technologies; and related server and workstation systems, protocols, and security issues.