Cybersecurity Analyst

  • Los Angeles, CA
  • Posted 13 days ago | Updated 13 days ago

Overview

On Site
Depends on Experience
Contract - W2
Contract - Independent
Contract - 12 Month(s)

Skills

network forensic analysis
ystem logs
firewall logs
Network Intrusion Detection System (IDS) alerts
Host Intrusion Detection Systems (HIDS) alerts
Web Application Firewall (WAF) alerts
endpoint malware alerts
indicators of compromise (IOCs)
CEH
GCFE
GCFA
GCIH
GCIA
CISM
CISSP
Security information and event management (SIEM) system

Job Details

Title: Cybersecurity Analyst

Location: Los Angeles, CA (Onsite)

Duration: 12 Months

Duties and Responsibilities:

Collaborate and assist Security Operation Center (SOC) team in Event Monitoring, Incident Response, endpoint forensics, and Identification of potential security incidents.

Identify indicators of compromise (IOCs) from analyzing system logs, firewall logs, Network Intrusion Detection System (IDS) alerts, Host Intrusion Detection Systems (HIDS) alerts, Web Application Firewall (WAF) alerts, endpoint malware alerts, and other log sources/technologies.

Detect and triage security events and escalate incidents as required by SOC processes/playbooks.

Perform network forensic analysis (e.g. Netflow and PCAP) to produce accurate threat detection rules (SNORT, YARA, etc.)

Analyze potential malicious files and payloads.

Analyze potential phishing and social engineering attempts.

Education/Experience:

A passion and drive for Cybersecurity; and A degree from an accredited college or university.

or

Professional experience in cybersecurity, IT, public safety or related security development, or equivalent experience.

Required Skills:

Cybersecurity professional certifications such as CEH, GCFE, GCFA, GCIH, GCIA, CISM, or CISSP.

Proficient with log analysis using log aggregators such as Splunk or Elastic, Security information and event management (SIEM) system, and various other security tools and services.

Demonstrated knowledge of the current cyber threat landscape, defenses, motivations, and techniques.

Familiar with the technical aspects of malware, botnets, and other malicious tools.

Familiar with the MITRE ATT&CK framework, Lockheed Martin Kill Chain, DNI Cyber Threat Framework, or other Cybersecurity frameworks.

Familiar in scripting or programming for popular languages such as: Javascript, Python, HTML, and

Proven record of exercising good judgment and professionalism in a fast-paced and/or intense working environment; strong writing and research skills.

Excellent communication skills and ability to work with the private sector, and department staff.

About Satwic Inc