Direct Client - Cyber Security Analyst - Los Angeles, CA Onsite - Need Local candidates

Overview

On Site
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - 24 Month(s)

Skills

Cyber Security
certification

Job Details

NOTE:

Need State client experience candidate

First preference will be local candidates


Title: Cyber Security Analyst
Location: Los Angeles, CA Onsite

 

Job Description
Duties and Responsibilities:
The analyst will report to the Integrated Security Operation Center (ISOC) Manager.
Collaborate and assist Security Operation Center (SOC) team in Event Monitoring, Incident Response, endpoint forensics, and Identification of potential security incidents.
Identify indicators of compromise (IOCs) from analyzing system logs, firewall logs, Network Intrusion Detection System (IDS) alerts, Host Intrusion Detection Systems (HIDS) alerts, Web Application Firewall (WAF) alerts, endpoint malware alerts, and other log sources/technologies.
Detect and triage security events and escalate incidents as required by SOC processes/playbooks.
Perform network forensic analysis (e.g. Netflow and PCAP) to produce accurate threat detection rules (SNORT, YARA, etc.)
Analyze potential malicious files and payloads.
Analyze potential phishing and social engineering attempts.
Requirements:
A passion and drive for Cybersecurity; and
A degree from an accredited college or university; or
Professional experience in cybersecurity, IT, public safety or related security development, or equivalent experience.
What can set you apart:
Cybersecurity professional certifications such as CEH, GCFE, GCFA, GCIH, GCIA, CISM, or CISSP.
Proficient with log analysis using log aggregators such as Splunk or Elastic, Security information and event management (SIEM) system, and various other security tools and services.
Demonstrated knowledge of the current cyber threat landscape, defenses, motivations, and techniques.
Familiar with the technical aspects of malware, botnets, and other malicious tools.
Familiar with the MITRE ATT&CK framework, Lockheed Martin Kill Chain, DNI Cyber Threat Framework, or other Cybersecurity frameworks.
Familiar in scripting or programming for popular languages such as: Javascript, Python, HTML, and
Proven record of exercising good judgment and professionalism in a fast-paced and/or intense working environment; strong writing and research skills.
Excellent communication skills and ability to work with the private sector, and department staff.