cmonova
Active Member
- Reaction score
- 23
Have a position for a few people. This is remote work so you don't have to relocate.
Description: Tier 1 Security Analyst to be responsible for real-time monitoring, analysis, and resolution of identified security incidents. Will perform daily operations utilizing a SIEM and monitor events from
multiple sources including but not limited to firewall logs, system logs (Unix and Windows), network and host based intrusion detection systems, applications, databases, and other security information monitoring tools.
Communicate and escalate issues and incidents as required by process or management
Performing documentation review and improvement
Attending meetings as needed
Documentation of all incidents and tickets in the appropriate systems before the end of each shift
Participate in knowledge sharing with other analysts and writing technical articles for Internal Knowledge Bases
Additional responsibilities will include assisting the Tier 2 Security Analyst in creation of process, procedures, technical documentation, and completion of project tasks as required.
Qualifications:
To be considered for this role it is preferred the candidate have 1-2 years of Information technology experience with network technologies, specifically TCP/IP, and related network tools.
Must have:
A sound understanding of TCP/IP and networking concepts
Solid and demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management.
Strong deductive reasoning, critical thinking, problem solving, and prioritization skills
Experience assisting the development and maintenance of tools, procedure, and documentation
Customer service including the resolution of customer escalations, incident handling, and response
Experience in a fast paced, high stress, support environment
Ability to follow detailed process and procedure documentation
Ability to present complex solutions and methods to general community
Demonstrated ability to be reliable and flexible
Excellent written and verbal communication and organizational skills
Outstanding work ethic
Strong team player that collaborates well with others to solve problems and actively incorporate input from various
sources
Be able to obtain or have an active DoD security clearance (Secret)
Desired Experience:
Experience with reviewing raw log files, data correlation, and analysis (i.e. firewall, authentication, network flow, IDS,
system logs, etc.)
Use of IDS, IPS, and/or other signature matching technology
Bachelor’s degree, may have security experience in lieu of education (documentation required)
CompTIA Security+ and/or SANS GSEC (or equivalent) certification
This is a 24x7 operation, this person will be required to cover a shift routine including weekends, and holidays.
Description: Tier 1 Security Analyst to be responsible for real-time monitoring, analysis, and resolution of identified security incidents. Will perform daily operations utilizing a SIEM and monitor events from
multiple sources including but not limited to firewall logs, system logs (Unix and Windows), network and host based intrusion detection systems, applications, databases, and other security information monitoring tools.
Communicate and escalate issues and incidents as required by process or management
Performing documentation review and improvement
Attending meetings as needed
Documentation of all incidents and tickets in the appropriate systems before the end of each shift
Participate in knowledge sharing with other analysts and writing technical articles for Internal Knowledge Bases
Additional responsibilities will include assisting the Tier 2 Security Analyst in creation of process, procedures, technical documentation, and completion of project tasks as required.
Qualifications:
To be considered for this role it is preferred the candidate have 1-2 years of Information technology experience with network technologies, specifically TCP/IP, and related network tools.
Must have:
A sound understanding of TCP/IP and networking concepts
Solid and demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management.
Strong deductive reasoning, critical thinking, problem solving, and prioritization skills
Experience assisting the development and maintenance of tools, procedure, and documentation
Customer service including the resolution of customer escalations, incident handling, and response
Experience in a fast paced, high stress, support environment
Ability to follow detailed process and procedure documentation
Ability to present complex solutions and methods to general community
Demonstrated ability to be reliable and flexible
Excellent written and verbal communication and organizational skills
Outstanding work ethic
Strong team player that collaborates well with others to solve problems and actively incorporate input from various
sources
Be able to obtain or have an active DoD security clearance (Secret)
Desired Experience:
Experience with reviewing raw log files, data correlation, and analysis (i.e. firewall, authentication, network flow, IDS,
system logs, etc.)
Use of IDS, IPS, and/or other signature matching technology
Bachelor’s degree, may have security experience in lieu of education (documentation required)
CompTIA Security+ and/or SANS GSEC (or equivalent) certification
This is a 24x7 operation, this person will be required to cover a shift routine including weekends, and holidays.