Junior Systems Support Aide Tier 1 Threat Hunting and SOAR

Overview

On Site
$40,000 - $120,000
Contract - Independent
Contract - W2
Contract - 12 Month(s)

Skills

Supports Information Technology Division by assisting professional staff with securing and maintaining law enforcement information systems. Performs technical and administrative tasks to help enforce security procedures
monitor system activity
and maintain compliance with agency policies and CJIS standardsKey Responsibilities and areas:Assist in building and maintaining Splunk dashboards to support visibility into security events
alerts
and trends.Monitor network intrusion detection system (NIDS) logs to help identify unusual traffic patterns or potential threats.Analyze host-based intrusion detection system (HIDS) alerts to support detection of suspicious endpoint behavior.Review and interpret proxy logs to identify suspicious or unauthorized internet activity
such as access to malicious domains or data exfiltration attempts.Collaborate with senior Security analysts to investigate and validate potential threats or indicators of compromise.Document findings and assist in escalating verified threats in accordance with procedures and threat hunting playbooks.Ideal Candidate:The ideal candidate is detail-oriented
reliable
and has a foundational understanding of IT operations and cybersecurity principles. Familiarity with security practices
system administration
or law enforcement IT environments is preferred. As part of on-the-job training
the selected candidate may rotate through various duties to gain a comprehensive perspective that integrates law enforcement operations
CJIS compliance
and industry best practices.

Job Details

Supports Information Technology Division by assisting professional staff with securing and maintaining law enforcement information systems. Performs technical and administrative tasks to help enforce security procedures, monitor system activity, and maintain compliance with agency policies and CJIS standards

Key Responsibilities and areas:

  • Assist in building and maintaining Splunk dashboards to support visibility into security events, alerts, and trends.
  • Monitor network intrusion detection system (NIDS) logs to help identify unusual traffic patterns or potential threats.
  • Analyze host-based intrusion detection system (HIDS) alerts to support detection of suspicious endpoint behavior.
  • Review and interpret proxy logs to identify suspicious or unauthorized internet activity, such as access to malicious domains or data exfiltration attempts.
  • Collaborate with senior Security analysts to investigate and validate potential threats or indicators of compromise.
  • Document findings and assist in escalating verified threats in accordance with procedures and threat hunting playbooks.

Ideal Candidate:

The ideal candidate is detail-oriented, reliable, and has a foundational understanding of IT operations and cybersecurity principles. Familiarity with security practices, system administration, or law enforcement IT environments is preferred. As part of on-the-job training, the selected candidate may rotate through various duties to gain a comprehensive perspective that integrates law enforcement operations, CJIS compliance, and industry best practices.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About HighIQ Robotics Inc.