Security Analyst – Global Security Operations Center (SOC) Part Time - Schubring Global Solutions
Dulles, VA 20166
About the Job
About Schubring Global Solutions
SGS was founded in 2013 to provide elite security consulting to forward thinking organizations. Our customers recognize that security is not a commodity and requires the best advice possible for the best value.
Our approach is straightforward. Our team has been on both sides of the table, and we firmly believe in treating our customers the way we would expect to be treated. Every member of our team embraces our core values. We will not compromise our integrity and we will only act in our customers' best interests.
As security practitioners, we embrace the impact of our actions and recommendations on our customers and their people. We operate as trusted partners…because that is what we are.
We are seeking a Security Analyst (SA) to become a valued member of our team supporting a rapidly growing global technology client.
The SA will be part of a GSOC team responsible for continuously monitoring the global
network for breaches and anomalous activity. The SA will detect, analyze and limit
intrusions and security events. The SA will work collaboratively to detect and respond to
information security incidents; maintain and follow procedures for security event
alerting; and participate in security investigations.
Additional responsibilities include such tasks as monitoring, research, classification,
and analysis of security events that occur within our environment. The ideal candidate
will have security industry knowledge that evolves with current and emerging
vulnerabilities and threats, as well as an ongoing understanding of key business and
technological processes.
Key Responsibilities:
- Assist in establishing a mature and optimized Security Operations Centerdiscipline to support managed security services focused on vulnerability andsecurity information event management engagements.
- Monitor and analyze Security Information and Event Management (SIEM) andother tools to identify security issues for remediation.
- Monitor and analyze alerts and notifications from multiple security systems.
- Communicate, escalate, and/or mitigate alerts regarding intrusions andcompromises to the enterprise.
- Conduct operations surrounding cyber security incident response technologiesincluding network logging and forensics, security information and eventmanagement tools, security analytics platforms, log search technologies, andhost-based forensics, as needed.
- Perform scanning and monitoring activities to provide in-depth visibility intopotential known and unknown vulnerabilities and threats that may pose risks toour environment.
- Document actions in cases to effectively communicate information to internaland external stakeholders.
- Perform hunting for malicious activity across the network and digital assets.
- Maintain incident logs with relevant activity.
- Document investigation results, ensuring relevant details are passed to GSOCLead and stakeholders.
- Participate in root cause analysis or lessons learned sessions.
- Establish and maintain excellent working relationships/partnerships with thecyber security and infrastructure support teams throughout the InformationTechnology organization, as well as business units.
Education
- Bachelor's degree in Cybersecurity, Computer Science, or related focusedtechnical training or 4 additional years of engineering and project managementexperience that may have been acquired in the military or public sectors.
Qualifications
- 5 years of Information Technology experience, with at least 2 years of experiencein information security working within security operations and 2 years'experience monitoring threats via a SIEM console.
- Detailed understanding of NIST Special Publication 800-61 Revision 2, ComputerSecurity Incident Handling Guide.
- Exceptional working knowledge of TCP/IP Networking and the OSI model.
- In-depth knowledge of the Intelligence-driven defense utilizing the Cyber KillChain (CKC).
- Significant experience performing analysis of log files from a variety of sources,including individual host logs, network traffic logs, firewall logs, or intrusionprevention logs.
- Significant experience with packet and malware analysis.
- Strong customer service skills and decision-making skills.
- Experience creating actionable content for a diverse range of commercialsecurity tools and/or SIEM technologies.
- Excellent problem solving, critical thinking, and analytical skills with the ability todeconstruct problems.
- Possess Microsoft SC-200: Microsoft Security Operations Analyst or the ability to obtain within 90 days of hire.
Desired Qualifications
- Possess relevant certifications, such as Certified Information Systems SecurityProfessional or Associate, EC Council Certified Ethical Hacker (CEH), or Formal
IT Security/Network Certification such as SANS GIAC Certified Intrusion Analyst
(GCIA), SANS GIAC Network Forensic Analyst (GNFA), or SANS GIAC Certified
Incident Handler (GCIH).
Other:
Security Clearance: Must successfully pass a company background check.
SGS is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, national origin, age, protected veteran status, or disability status.
Apply here: https://schubringglobal.com/careers/
The pay range for this role is:
38.64 - 38.64 USD per hour(Sterling, VA)
PI255545989
Source : Schubring Global Solutions