Home

Need-Security Analyst (Tier 3)-Austin,TX at Austin, Texas, USA
Email: [email protected]
From:

Subham Mohanty,

VYZE INC

[email protected]

Reply to:   [email protected]

Job Description -

Security Analyst (Tier 3)

US Citizens Only! 

Hybrid: Local to Austin, TX Only.

CJIS background clearance

Need to take the Spark Test

Selected candidates must be US Citizens, pass a CJIS background check process, and complete basic safety and security training to meet the customer requirements. 

Holding Certified Ethical Hacker (CEH) and/or Certified Incident Handler (GCIH or ECIH) credentials is a plus for this position. 

This position is based in AUSTIN, TX and the candidate will need to commit to working onsite 2 (two) days per week (currently Monday and Wednesday are designated, however any 2 days between Monday and Friday will be sufficient). The rest of the week can be worked remotely. This position will work 8am 5pm with a rotating on-call schedule. The role is set for a full 40hr each week with no overtime. If a worker is to go over, then comp time will be granted upon communication and coordination with the manager.

Please ensure that your candidates are aware that they will have to clear a CJIS background clearance, as it is a State of Texas supporting position.  Each candidate must also be a US Citizen. Note that it can take up to 6 weeks for a candidate to clear, and they will not be able to begin until cleared.

Security Analyst (Tier 3) - Dedicated

Candidate Description

This is an analyst role and candidate must be able to demonstrate ability to perform and support in-depth investigations and hunting activities.  Demonstrated experience in using Azure Sentinel SIEM as an analyst is REQUIRED.   

This position is based in AUSTIN, TX and the candidate will need to commit to working onsite 2 (two) days per week (currently Monday and Wednesday are designated, however any 2 days between Monday and Friday will be sufficient).  This position will support the customers 24/7 Security Operations Center (SOC).  This position is in direct support (on-site at the customer facilities) of an Client's customer in the government sector.  Client is providing Managed Security Service Provider (MSSP) functions related to the Security Operations Center (SOC), including Tier 2 through Tier 3 resource capabilities and activities related to security monitoring, threat, and vulnerability management and incident response (IR).  Preference will be made for candidates who can support non-business hours shifts.

Candidate Requirements

Candidate should have strong communications skills, both written and verbal, be comfortable presenting information to teammates, customer technical personnel and client's Leads and Managers.

The preferred candidate is REQUIRED to have:

    Eight (8) years of Security Incident Response, Security Operations Center, and/or threat analysis experience.

    Demonstrated experience using either an Enterprise/MSSP and or cloud Security SIEM technologies as an analyst.

    Ability to support and work across multiple customer and bespoke systems.

    Must be able to pass a CJIS background check process and other background checks to comply with customers contracts.

    Complete basic safety and security training to meet the customer requirements.

    Ability to work a rotating shift and on-call schedule as required.

    CompTIA Security + certification or equivalent/higher

    Splunk Power User Certification

    Selected candidates must be US Citizens.

Candidate Preferred Requirements

The Preferred candidate holding one or more of the industry certifications will be a plus, but not required.

    Certified Ethic Hacker (CEH) or equivalent

    Certified Incident Handler (GCIH or ECIH) 

    Other Certs - such as CompTIA Networking+, any Cloud Certifications, Devo, Splunk, Azure Sentinel

    Experience with Proofpoint, Security Onion and FireEye

Qualifying Experience and Attributes

    Ability to create and maintain custom reports, dashboards and views utilizing the SIEM

    Ability to create use cases to customize the alerting of the SIEM to meet customer needs

    Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.

    Ability to work independently with only minor oversight

    Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute). 

    Knowledge of computer networking concepts and protocols, and Cyber security methodologies. 

    Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts. 

    Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). 

    Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). 

    Knowledge of incident response and handling methodologies. 

    Knowledge of new and emerging information technology (IT) and cybersecurity technologies. 

    Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

    Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

    Knowledge of security system design tools, methods, and techniques.

    Knowledge of Virtual Private Network (VPN) security.

    Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities. 

    Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. 

    Knowledge of adversarial tactics, techniques, and procedures. 

    Knowledge of network tools (e.g., ping, traceroute, nslookup) 

    Knowledge of defense-in-depth principles and network security architecture.

    Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).

    Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).

    Knowledge of interpreted and compiled computer languages.

    Knowledge of cyber defense and information security policies, procedures, and regulations. 

    Knowledge of the common attack vectors on the network layer.

    Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). 

    Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored). 

    Knowledge of system administration, network, and operating system hardening techniques.

    Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). 

    Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). 

    Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. 

    Signature implementation impact for viruses, malware, and attacks. 

    Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

    Knowledge of Mitre ATT&CK and Mitre D3FEND

    Knowledge of the Lockheed-Martin Cyber Kill Chain

    Knowledge of common cybersecurity frameworks, regulations, and compliance standards

    Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).

    Skill in using protocol analyzers.

    Skill in collecting data from a variety of cyber defense resources.

    Skill in recognizing and categorizing types of vulnerabilities and associated attacks.

    Skill in reading and interpreting signatures (e.g., snort).

    Skill in performing packet-level analysis.

Keywords: information technology golang Texas
[email protected]
View all
Thu Nov 09 03:31:00 UTC 2023

To remove this job post send "job_kill 841607" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 52

Location: , Indiana