SOC or Security Analyst Local to Austin TX or Dallas TX USC only at Dallas, Texas, USA |
Email: [email protected] |
From: Sonali, KPG99 [email protected] Reply to: [email protected] Job Title: SOC or Security Analyst Visa: USC only Duration: 6 months Location: Austin, TX or Dallas, TX (Onsite 3 days a week) Job Description KForce is seeking a Mid or Senior Level Cyber Security Analyst to work on the CISO Security Operations Center team supporting the rapid threat detection and response mission. This position requires a motivated fast learner, who can work within a security operations function to identify, analyze, and remediate potential threats to the environment. The candidate will require security industry knowledge that evolves with current and emerging threats, as well as an ongoing understanding of key business and technological processes. Essential Duties and Responsibilities Drive the global security monitoring and rapid response mission across the team Detect, respond, mitigate, and report on cyber threats/incidents that may impact the environment Model effective communication and response to internal stakeholders within your investigations Improve runbooks, processes and response capabilities Resolve problems independently and understand escalation procedures Participate in security incidents and act as the technical Subject Matter Expert during significant security incidents Collaborate with technical leads: Engineering, Operations, Service Desk, Applications and BISOs on matters related to security monitoring across global footprint Collaborate and serve as liaison to Managed and/or Unmanaged Security Service providers Act as an internal information security consultant to the business and technology units, advising on risks, threats and control practices related to Rapid Response Conduct training and knowledge sharing sessions within the team Drive rule tuning and detection use cases across our SOC tools Provide oversight and mentoring to other team members to improve team capabilities Perform threat hunts that target adversary TTPs across enterprise environments Requirements: 4+ years of information security experience in a security operations or engineering role Strong understanding of networking protocols and firewall management Enterprise experience in incident response or security operations environment Experience with programming or scripting languages Experience tuning rules within SIEM tools like Qradar Strong experience with EDR platforms, such as Crowdstrike, Microsoft Defender 365, Uptycs or Carbon Black, conducting analysis as part of investigations Experience with cloud computing platforms, e.g. IBM Cloud, Amazon Web Services, Azure Experience with host virtualization platforms, e.g. VMware, Hyper-V Experience with application container technologies, e.g. Kubernetes Purple team experience conducting attacker simulation and adversary emulation System administration skills for Windows and Linux Windows, Linux and/or Mac forensics Education: Bachelors Degree Relevant IT security industry recognized certifications (CASP, CISSP, GCIH, GCIA, GMON, OSCP, etc.) Thanks & Regards Sonali Kumari Technical Recruiter KPG99, INC Keywords: information technology Texas SOC or Security Analyst Local to Austin TX or Dallas TX USC only [email protected] |
[email protected] View all |
Fri Apr 05 03:26:00 UTC 2024 |