Cyber Security Analyst - REMOTE

Overview

Remote
Hybrid
Up to $58
Full Time

Skills

Cyber security
cyber security analyst
security analyst
cyber
firewall
AlgoSec
Checkpoint
CISCO ASA
SilverPeak
VMWare NSX
threats
information security
ISC2
CISA
CompTIA
EC-Council
ISACA
GSEC
CISSP
GCIH
GCFA
CISM
Windows
Unix
Linux
network security
vulnerability
switches
switching
routers
TLS/SSL
IPsec
SSH
PGP
VLAN
LLDP
LACP
ARP
802.1x
DNS
AES
scripting languages
PowerShell
Python
FireEye NX
AX
PX Endpoint
Splunk
Tenable
Rapid7
AppSpider
encryption
Globalscape Secure FTP
penetration
Metasploit
Kali Linux
Netsparker
and Wireshark
Snort
Security Onion
SolarWinds Security Event Manager
packet sniffers
Tcpdump and Windump
SAST
DAST
Veracode
AppScan

Job Details

Company and Role:

Dedicated Tech Services, Inc. (DTS) is an award-winning IT consulting firm based in Columbus, OH. We now have an opening for a Cyber Security Analyst.

Highlights and Benefits:

  • 95% Remote in Harrisburg, PA may be required on-site occasionally.
  • Must go on-site the first day of the engagement to pick up equipment and badge.
  • W2 hourly pay rate up to $58hr or salaried equivalent
  • Direct W2 hourly or salaried applicants only (no corp-to-corp subcontractors, third parties, or agencies)
  • Paid time off and holidays for salaried employees
  • 401K, billable bonus, and health, life, vision, dental and short-term disability insurance options for all
  • DTS is a proud Women Business Enterprise (WBE) and Woman Owned Small Business (WOSB)!
  • Check out our benefits and company information at !

Job Description:

We are hiring an experienced Cyber Security Analyst to work for us as our direct, W2 salaried or hourly employee. You will:

  • Demonstrate good judgement and problem-solving skills. React and adapt to changing circumstances rapidly.
  • Technically proficient and experienced with Windows and Unix/Linux operating systems, enterprise class firewalls, network security, network traffic analysis, incident response, vulnerability analysis, packet analysis, and systems hardening.
  • Possess proficient knowledge of layer 2 switching and layer 3 routing protocols, encryption protocols, communication protocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, PGP, VLAN, LLDP, LACP, ARP, 802.1x, DNS, AES, etc.
  • Assist in deterring, identifying, monitoring, investigating and analyzing network intrusions. Collect intrusion artifacts, indicators of compromise, correlates artifacts across systems, and gathers other relevant facts to enable mitigation of potential incidents within the enterprise.
  • Receive and analyze network alerts from various sources within the enterprise. Determine the alert trigger, the severity of the alert, and prioritizes response accordingly. Track and document incidents from initial detection to final resolution.
  • Participate in the containment and neutralization of cyber threats based on the intelligence and indicators of compromise gathered. Assess damage to services, systems, networks, data and other relevant assets.
  • Participate in the restoration and reconstitution of systems and services. Makes recommendations to prevent the recurrence of cyber incidents and verifies that normal operations have resumed.
  • Manage, monitor, and analyze several security technologies to include defensive and offensive security solutions on the perimeter and internal networks such as firewalls, intrusion detection/prevention systems (IDS/IPS), data loss prevention, etc.
  • Use data from Security Information and Event Management (SIEM) and other logging solutions to conduct analysis, identify cyber trends, disseminate relevant findings, and recommend suitable security and/or compensating controls.
  • Participate in the design and implementation of security controls. Grant and revoke access to restricted resources, ensure that end-users are authorized to access requested resources, and participate in periodic system audits/cleanup initiatives.
  • Assist leadership in planning and implementing cybersecurity infrastructure or technology related projects, participate in the installation of equipment, related cabling, and conduct ongoing maintenance/repair of security infrastructure assets as needed.
  • Perform research, evaluates security technologies/services, to drive process improvements, integrate automation, increase efficiency, strengthen service delivery, and improve security posture.
  • Assist in maintaining an accurate and thorough knowledgebase. Create and revise documentation, procedures, flowcharts, diagrams, etc.
  • Leverage client incident tracking and ticketing systems to receive tasks from other units, delegate tasks to other units, prioritize daily tasks, document actions taken, and the final resolution for tasks completed.
  • Provide on-call and emergency support, including after-hours as needed.
  • Adhere to established service management processes and procedures.
  • Perform all other related duties as assigned.

Required Skills and Experience:

  • Minimum 5 years' professional cyber-security experience with at least 2 years in a large-scale enterprise Windows environment
  • Understanding of current threats and trends in information security.
  • Professional oral and written communication skills.
  • Excellent soft skills such as listening, presenting, and negotiating.
  • Must pass required Pennsylvania State Police background check (cannot have any felony offenses)
  • Ability to work remotely.

Desired Skills and Experience:

  • Active cyber-security certification from an accredited organization such as ISC2, CISA, CompTIA, EC-Council, ISACA, GSEC, etc.
  • Desired Certifications: ISC2, CISA, CompTIA, EC-Council, ISACA, GSEC (or other relevant certs such as CISSP, GSEC, GCIH, GCFA, CISM)
  • Experience with Firewalls: AlgoSec, Checkpoint, CISCO ASA, SilverPeak, VMWare NSX
  • Experience with scripting languages PowerShell, Python, etc.
  • Experience with forensic tools, such as Network security monitoring: FireEye NX, AX, PX Endpoint, Splunk
  • Experience with Web vulnerability scanning: Tenable.IO, Rapid7 AppSpider
  • Experience with Encryption: Globalscape Secure FTP, PGP
  • Experience with Penetration testing: Metasploit, Kali Linux, Netsparker, and Wireshark
  • Experience with Network intrusion detection tools such as Snort, Security Onion, SolarWinds Security Event Manager
  • Experience with Packet sniffers such as Tcpdump and Windump
  • Familiarity with SAST and DAST tools such as Veracode, AppSpider and AppScan

Those authorized to work in the US are encouraged to apply. We are unable to sponsor at this time.

Dedicated Tech Services, Inc. is an Equal Opportunity Employer