Home

Hybrid Title: Security Analyst USC ONLY at Remote, Remote, USA
Email: [email protected]
Must gave 
Onsite Candidates Must be Local To Virginia Area

University / College

Title: Security Analyst

Location: Hybrid 4 Days
Onsite Candidates Must be Local To Virginia Area

Rate: $55-58/Hr C2C

Visa: Only Citizen

MOI: Skype

About this Position /
Responsibilities

Serving
as the Initial Escalation Point for all Investigations/Incidents Requiring
Remediation and/or Coordination

Continuous
Monitoring of the Alert Queue

Responding
to Security Incidents with Strict Adherence to Codified Triage Process and
Procedures

Performing
Basic Event Correlation and Validation Activities

Performing
Identification of Effected Systems, Networks and Data

Engaging
with Network Operations to Refine Contextual Understanding of Incidents as
Appropriate

Escalating
Incidents In Accordance with Established Policies and Procedures

Monitoring
and Enforcing all Response SLAs

Identifying
and Documenting Any Security Risk Associated with Security
Operations/Engineering

Documenting
Recommendations for Automation and Innovation

Initial
Analysis of Security Events, Network Traffic, and Logs.

Monitoring
Security Sensor Activity and Associated Logs to Identify Anomalies and
Intrusions

Network
Incident First Responder for Reviewing and Verifying System
Alerts/Events/Messages/Status/Availability

Identifying
Issues with Incident Response Plans, Worflows, SOPs, KBAs, etc.

Creation
of Shift Turnover Documentation and Products

Serving
as Entry Point to Security Operations; Log all Requests, RFIs, Calls, etc
and Work Through to Customer Satisfaction. Add to Turnover as Required.

Creating
Reports/Briefs/AARs/etc as Required

Joining
all IT Operations Generated Bridge Calls

Thinking
Critically and Creatively While Analyzing Security Events, Network
Traffic, Events and Logs.

Incident
Response Coordination: Work with Affected Customers to Gather Incident
Information, Assess Mission Impact.

Countermeasure
Implementation: In support of IR Actions, Create Options for Isolate and
Block Threat Actor Presence.

Daily
Standup Meeting with SecOps

Creating
and updating Incident, Request, and Work Orders daily

Performs
Final Quality Assurance Checks and Closes Tickets with High Degree of
Scrutiny

Responsible
for Daily Block list peer review tasks

Qualification

5 years related
experience in security operations

Bachelor's degree
or 7 years of hands-on security work experience

US Citizenship required

2 years of
experience with
Splunk
SIEM application

Preferred:

7 years related
experience in security operations

3 years of
experience with Splunk SIEM application

Security+ Certification

--

Keywords: information technology
Hybrid Title: Security Analyst USC ONLY
[email protected]
[email protected]
View All
10:38 PM 28-Feb-25


To remove this job post send "job_kill 2217295" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 1

Location: ,