Home

Network Security Analyst 1 | Hybrid - Austin TX | 18 Months | State of Texas at Austin, Texas, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=1113241&uid=

Kindly share your Resume to [email protected]

Need only Texas locals only and State Client Exp is a must

Position:

Network Security Analyst 1

Location: 
Hybrid Austin TX

Duration:
1
8 Months

Level Description

1-3 years of experience in the field or in a
related area. Has knowledge of commonly used concepts, practices, and
procedures within a particular field. Relies on instructions and
pre-established guidelines to perform the functions of the job. Primary job
functions do not typically require exercising independent judgment.

Job Description

A network security analyst ensures that
information systems and computer networks are secure. This includes protecting
the company against hackers and cyber-attacks, as well as monitoring network
traffic and server logs for activity that seems unusual. Additionally, these
analysts are responsible for finding vulnerabilities in the computer networks
and creating recommendations for how to minimize these vulnerabilities. The
network security analyst investigates security breaches, develops strategies
for any security issues that arise, and utilizes the help of firewalls and
antivirus software to maintain security.

Additional job details and
special considerations

*** The candidate will need to be in Texas
and should be available to be on-site at Winters office in Austin when
requested for an on-site work. The position will be hybrid with complete
remote possibility.

Please fill this Skill matrix Table with your Experience

Minimum Requirements:
Candidates that do not meet or exceed
the minimum stated requirements (skills/experience) will
be displayed to customers but may not be chosen for this opportunity.

Actual

Years

Experience

Years

Experience

Needed

Required/

Preferred

Skills/Experience

3

Required

Utilize EDR/XDR platforms, including NetWitness,
SentinelOne, Microsoft Defender for Endpoint, and related products, to
correlate data from various network and security tools across the HHSC
network.

3

Required

Research, document, and present threat hunting research
on cyber threat actors specifically targeting HHSC business operations,
information networks, and data.

3

Required

Leverage cyber threat hunting frameworks including PEAK,
Sqrrl, and TaHiTI, to develop threat hunting hypotheses, determine scope,
ensure repeatable processes, define outputs, and measure success in malicious
behaviors detected, vulnerabilities discover.

3

Required

Employ threat modeling methodologies such as STRIDE,
TRIKE, MITRE ATT&CK, and PASTA, to identify potential vulnerabilities,
attack vectors, and threat actors specifically targeting HHSC networks, data,
and users.

3

Required

Develop, maintain, and update HHSC threat hunting program
documentation, including policies, SOPs, and playbooks, in accordance with
industry, DIR, and HHSC guidelines and documentation standards.

3

Required

CTI analyst experience within a security operations
center (SOC), providing support to internal cybersecurity Incident Response
teams or external cybersecurity engagements on managed security services
(MSS) teams in large-scale organizations.

5

Preferred

Experience with dynamic and static malware analysis tools
and techniques, such as Trellix, IDA Pro, and Ghidra, as well as open-source
tools such as Wireshark, VirusTotal, Hybrid Analysis, and Joe Sandbox.

5

Preferred

OSINT analyst experienced in utilizing brand and dark web
intelligence tools such as Palo Alto XPANSE, Flashpoint, Recorded Future
Intelligence Cloud, or Digital Shadows SearchLight.

5

Preferred

Utilize industry research, team meetings, collaboration
with HHSC IT and business units, in-depth understanding of HHSCs strategic
objectives, and candidates experience with NetWitness, SentinelOne, and
Microsoft Defender for Endpoint.

5

Preferred

Perform scheduled and ad-hoc meetings with relevant
software and other technical vendors such as NetWitness, SentinelOne, and
Microsoft, to provide feedback on current EDR/XDR usage, performance, and
utilization criteria.

5

Preferred

Troubleshoot, research, and resolve systemic issues in
EDR/XDR tools, including NetWitness, SentinelOne, and Microsoft Defender for
Endpoint, providing short-, medium- and long-term solutions to improve and
maintain desired performance levels.

5

Preferred

Assist in data parsing and normalization in NetWitness,
SentinelOne, and Microsoft Defender for Endpoint on data streams both
existing and new, leveraging advanced knowledge of scripting languages like
Python and PowerShell.

5

Preferred

One or more of the following certifications: NetWitness
Analyst, SentinelOne IR Engineer, Microsoft Security Operations Analyst
Associate, GCTI, GCFA, GREM, GCIH, GDAT.

Three
references needed: 

1.Referrance Name:

Title :

Company
Name :

Position :

Email
id ( Company email id) : 

Phone number : 

2.Referrance Name:

Title :

Company
Name :

Position :

Email
id ( Company email id) : 

Phone number : 

3.Referrance Name:

Title :

Company
Name :

Position :

Email
id ( Company email id) : 

Phone number : 

--

Keywords: active directory information technology Idaho Texas
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=1113241&uid=
[email protected]
View All
08:25 PM 13-Feb-24


To remove this job post send "job_kill 1113241" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 26

Location: Austin, Texas