Home

Need USC or GC :: Sr Cyber Security Ops Analyst :: New Hyde Park, NY - Hybrid - 3 days a week onsite :: 6 months contract to Hire E at New Hyde Park, New York, USA
Email: [email protected]
From:

Kevin Smith,

Navtech Inc

[email protected]

Reply to:   [email protected]

Hi Folks,

I have an opportunity for "Cyber Security Analyst, New Hyde Park, NY, Hybrid, Locals," 
 and I am looking for a candidate who can join immediately. If you are interested, reply to me with your updated resume, or if you could refer someone, I would really appreciate it.

Position  : Senior Cyber Security Ops Analyst

Location : New Hyde Park, NY - Hybrid

Duration : 6 months contract to Hire

Visa : US Citizens/Green Card

LOCAL CANDIDATES ONLY

Job Purpose

Job Purpose The Sr. Security Operations Analyst is responsible for security monitoring and incident response for internal and external threats. The Sr. Security Operations Analyst performs advanced threat analysis, collaborates with internal IT teams and MSSP for security monitoring response, improves correlation and monitoring of security events, and leads security monitoring projects.

Key Responsibilities

Security Monitoring

Conducts investigations and responds to internal and external security threats.

Oversees, responds to, and remediates DLP (data loss prevention) and SIEM events from on premise and cloud systems.

Implements advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints.

Manages, administrates, and improves security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS and other industry standard security technologies.

Develops automation response scripts to remediate commodity threats.

Performs threat hunting activities to identify compromised resources.

Understands and performs threat analysis utilizing industry standard frameworks (kill chain and diamond model).

Performs threat research and intelligence gathering to improve detection and response capabilities.

Proposes and helps review security plans and policies to improve the security environment.

Maintains operational playbooks, process diagrams and documentation for security monitoring and response.

Reviews proposed Security deployments to ensure security monitoring requirements are met.

Other duties may be assigned as needed to address new security threats facing the enterprise environment.

Provides off hour support as needed for security monitoring and response activities.

Incident Response

Works closely with MSSP services, external forensic providers, and in-house IT teams to respond to and remediate security incidents both internal and external.

Reviews compromised systems to identify root cause of security incidents and remediation actions that need to be taken.

Researches new TTPs (tactics, techniques, and procedures) that threat actors are utilizing to undermine enterprise IT environments.

Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities.

Correlate incident data to identify specific vulnerabilities and make recommendations that enable swift remediation.

Plans, implements, and documents incident handling and response tasks and procedures.

Emerging Threats Monitoring

Obtains information and stays up-to-date on the latest threats and security trends in a fast and efficient way to keep the enterprise environment protected.

Service Desk and Incident Management 

Assists in the investigation and resolution of security issues.

Qualification:

Bachelors degree in Computer Science degree or related field or equivalent combination of industry related professional experience and education

Working experience with Information Security, Network Security, and Security Monitoring and Incident Response

Working experience with industry standard security technologies and services Firewalls, VPN, IDS, Endpoint Security, DLP, AV, Proxy, SIEM

Strong experience with SIEM event/log analysis and correlations

Desired Skills:

GSEC, GCIA, GFE, GCFA, CISA, CISSP, CISM, or CIA certification(s)

Network / System Administration experience / background

Thanks for your valuable time!!!

Best Regards,

Kevin Smith | [email protected]

Lead Technical Recruiter |NAVTECH INC |www.navtechusa.com

Keywords: access management information technology New York
Need USC or GC :: Sr Cyber Security Ops Analyst :: New Hyde Park, NY - Hybrid - 3 days a week onsite :: 6 months contract to Hire E
[email protected]
[email protected]
View all
Wed Jul 10 03:18:00 UTC 2024

To remove this job post send "job_kill 1546066" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 15

Location: New Hyde Park, New York