Information Security Analyst - I - eTeam Inc.
Temple Terrace, FL 33637
About the Job
Job Title: Information Security Analyst
Locations: Ashburn VA (OR) Cary NC, (OR) Temple Terrace FL (Hybrid)
Duration:6-12+ Months
Only Night Shift 12 AM - 8AM EST
5 days a week, including weekends
JOB DUTIES:
Information Security Analysts are the backbone of the Security Operations Center (SOC), providing crucial support to enterprise-level customers.
Tier-1 Security Analysts with at least one year of experience in security or technical troubleshooting roles, such as help desk, handle various tasks across various platforms.
They play a pivotal role in the Security Incident and Event Management (SIEM) workflow, serving as the 24x7 "eyes on glass" who monitor alerts and escalate incidents as necessary.
Responsibilities:
-Conduct near real-time security monitoring in a 24x7 environment, utilizing proprietary SIEM and cybersecurity tools to identify Indicators of Compromise (IOCs).
-Monitor alert health in near real-time and escalate critical alerts according to service level agreements.
-Detects and analyzes security incidents, particularly complex or escalated events, to assess threats effectively.
-Address customer Requests For Information, leveraging soft and technical skills to query raw logs for IOCs, provide insights into SOC infrastructure, and offer guidance on SIEM features and best practices.
-Perform level 1 assessment of incoming alerts, prioritizing and correlating details to determine severity within the customer environment and coordinating with tier II/III for critical incidents as needed.
-Execute basic incident response activities using customer SIEM and cybersecurity toolkits.
-Contribute to the SOC Knowledge Base and provide input for revisions.
-Draft clear and concise escalation tickets.
MUST-HAVE SKILLS:
-Associate degree in Computer Science, Information Security, or a related field.
-1 to 3 years of experience in a security-related role.
-Fundamental knowledge of Cyber Security technologies.
-Understanding of the threat landscape and indicators of compromise.
-Strong problem-solving skills.
-Proactively engage with customers, client executives, and management teams.
-Excellent documentation and communication abilities in written and oral English.
DESIRED SKILLS:
-Bachelor's degree or higher in Computer Science, Information Security, or a related field.
-One or more years of experience in an Information Security Analyst position.
-Familiarity with basic cyber threat hunting techniques.
-Experience in incident response using different SIEMs and adhering to industry best practices.
-Proficiency in investigating security incidents, developing/tuning use cases, and understanding incident response protocols.
-Ability to create new content, searches, and scripts for tools like Splunk, QRadar, Sentinel, etc.
-Understanding of device logging, network troubleshooting, and device troubleshooting.
-Experience with incident response techniques such as network forensic analysis.
-Familiarity with Intrusion Prevention Systems (IPS) and analyzing alerts generated by inspection. -Scripting knowledge in languages like Python, Powershell, Bash Shell, Java, Ansible, etc.
-Relevant security certifications such as SANS GIAC, GCIH, CompTIA Security+, CCNP-Security, CySA+, GCED, CEH, or similar credentials.
-Understanding of the threat landscape and indicators of compromise.
-Strong problem-solving skills.
-Proactively engage with customers, client executives, and management teams.
-Excellent documentation and communication abilities in written and oral English.
DESIRED SKILLS:
-Bachelor's degree or higher in Computer Science, Information Security, or a related field.
-One or more years of experience in an Information Security Analyst position.
-Familiarity with basic cyber threat hunting techniques.
-Experience in incident response using different SIEMs and adhering to industry best practices.
-Proficiency in investigating security incidents, developing/tuning use cases, and understanding incident response protocols.
-Ability to create new content, searches, and scripts for tools like Splunk, QRadar, Sentinel, etc.
-Understanding of device logging, network troubleshooting, and device troubleshooting.
-Experience with incident response techniques such as network forensic analysis.
-Familiarity with Intrusion Prevention Systems (IPS) and analyzing alerts generated by inspection.
-Scripting knowledge in languages like Python, Powershell, Bash Shell, Java, Ansible, etc.
-Relevant security certifications such as SANS GIAC, GCIH, CompTIA Security+, CCNP-Security, CySA+, GCED, CEH, or similar credentials.
Locations: Ashburn VA (OR) Cary NC, (OR) Temple Terrace FL (Hybrid)
Duration:6-12+ Months
Only Night Shift 12 AM - 8AM EST
5 days a week, including weekends
JOB DUTIES:
Information Security Analysts are the backbone of the Security Operations Center (SOC), providing crucial support to enterprise-level customers.
Tier-1 Security Analysts with at least one year of experience in security or technical troubleshooting roles, such as help desk, handle various tasks across various platforms.
They play a pivotal role in the Security Incident and Event Management (SIEM) workflow, serving as the 24x7 "eyes on glass" who monitor alerts and escalate incidents as necessary.
Responsibilities:
-Conduct near real-time security monitoring in a 24x7 environment, utilizing proprietary SIEM and cybersecurity tools to identify Indicators of Compromise (IOCs).
-Monitor alert health in near real-time and escalate critical alerts according to service level agreements.
-Detects and analyzes security incidents, particularly complex or escalated events, to assess threats effectively.
-Address customer Requests For Information, leveraging soft and technical skills to query raw logs for IOCs, provide insights into SOC infrastructure, and offer guidance on SIEM features and best practices.
-Perform level 1 assessment of incoming alerts, prioritizing and correlating details to determine severity within the customer environment and coordinating with tier II/III for critical incidents as needed.
-Execute basic incident response activities using customer SIEM and cybersecurity toolkits.
-Contribute to the SOC Knowledge Base and provide input for revisions.
-Draft clear and concise escalation tickets.
MUST-HAVE SKILLS:
-Associate degree in Computer Science, Information Security, or a related field.
-1 to 3 years of experience in a security-related role.
-Fundamental knowledge of Cyber Security technologies.
-Understanding of the threat landscape and indicators of compromise.
-Strong problem-solving skills.
-Proactively engage with customers, client executives, and management teams.
-Excellent documentation and communication abilities in written and oral English.
DESIRED SKILLS:
-Bachelor's degree or higher in Computer Science, Information Security, or a related field.
-One or more years of experience in an Information Security Analyst position.
-Familiarity with basic cyber threat hunting techniques.
-Experience in incident response using different SIEMs and adhering to industry best practices.
-Proficiency in investigating security incidents, developing/tuning use cases, and understanding incident response protocols.
-Ability to create new content, searches, and scripts for tools like Splunk, QRadar, Sentinel, etc.
-Understanding of device logging, network troubleshooting, and device troubleshooting.
-Experience with incident response techniques such as network forensic analysis.
-Familiarity with Intrusion Prevention Systems (IPS) and analyzing alerts generated by inspection. -Scripting knowledge in languages like Python, Powershell, Bash Shell, Java, Ansible, etc.
-Relevant security certifications such as SANS GIAC, GCIH, CompTIA Security+, CCNP-Security, CySA+, GCED, CEH, or similar credentials.
-Understanding of the threat landscape and indicators of compromise.
-Strong problem-solving skills.
-Proactively engage with customers, client executives, and management teams.
-Excellent documentation and communication abilities in written and oral English.
DESIRED SKILLS:
-Bachelor's degree or higher in Computer Science, Information Security, or a related field.
-One or more years of experience in an Information Security Analyst position.
-Familiarity with basic cyber threat hunting techniques.
-Experience in incident response using different SIEMs and adhering to industry best practices.
-Proficiency in investigating security incidents, developing/tuning use cases, and understanding incident response protocols.
-Ability to create new content, searches, and scripts for tools like Splunk, QRadar, Sentinel, etc.
-Understanding of device logging, network troubleshooting, and device troubleshooting.
-Experience with incident response techniques such as network forensic analysis.
-Familiarity with Intrusion Prevention Systems (IPS) and analyzing alerts generated by inspection.
-Scripting knowledge in languages like Python, Powershell, Bash Shell, Java, Ansible, etc.
-Relevant security certifications such as SANS GIAC, GCIH, CompTIA Security+, CCNP-Security, CySA+, GCED, CEH, or similar credentials.
Source : eTeam Inc.