***In Person Interview.*** Initial PO for 12 months; usually projects with this customer goes for 3+ years ***w2 or 1099 or c2c;Onsite***
Job Description:
This position plays an essential role in protecting the confidentiality, integrity and availability of client information and systems. This position ensures that the appropriate security monitoring and analysis controls, standards and procedures are properly configured and utilized, to protect confidential information used by the State from known and unknown internal or external threats. These threats include, but are not limited to, identity theft, data loss, data damage, unauthorized access and cyber-attacks. This position defends the State against attacks which disrupt, destroy, or threaten the delivery of essential services for the State.
Key Responsibilities:
- Conducts daily traffic analysis, identifies and characterizes anomalous activity
- Performs in-depth system and network forensics to identify and eradicate threats
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Generates incident reports, investigates suspicious network and system activity
- Perform cyber defense trend analysis and reporting
- Determine tactics, techniques, and procedures (TTPs) for intrusion sets
- Reconstruct a malicious attack or activity based off network traffic
- Proactively identifies threats to the enterprise, initiates the distribution of enterprise wide alerts
- Coordinate with enterprise-wide cyber defense staff to validate network alerts
- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
- Monitors software patches, security fixes, and tests and validates modified systems
- Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
- Recommend computing environment vulnerability corrections
- Processes, documents, and coordinates resolution of cyber incidents with appropriate teams
- Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event''s history, status, and potential impact for further action in accordance with the organization''s cyber incident response plan
- This position provides coverage to the Central AZSOC for swing shifts and covering weekend hours working in North Phoenix
Senior Security Operations Center Analyst:
- Conducts daily traffic analysis, identifies and characterizes anomalous activity
- Performs in-depth system and network forensics to identify and eradicate threats
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Generates incident reports, investigates suspicious network and system activity
- Perform cyber defense trend analysis and reporting
- Determine tactics, techniques, and procedures (TTPs) for intrusion sets
- Reconstruct a malicious attack or activity based off network traffic
- Proactively identifies threats to the enterprise, initiates the distribution of enterprise wide alerts
- Coordinate with enterprise-wide cyber defense staff to validate network alerts
- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
- Monitors software patches, security fixes, and tests and validates modified systems
- Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
- Recommend computing environment vulnerability corrections
- Processes, documents, and coordinates resolution of cyber incidents with appropriate teams
- Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event''s history, status, and potential impact for further action in accordance with the organization''s cyber incident response plan
- This position provides coverage to the Central AZSOC for swing shifts and covering weekend hours working in North Phoenix
Required Qualifications:
- A solid, end-to-end understanding of Information technology systems, especially as they apply to security
- Ability to successfully triage security detections and alerts from any source (network, endpoint, audit logs, identity, etc..), perform incident response and support incident management
- Ability to work under pressure, prioritize issues, and maintain sufficient attention to ensure an appropriate response to cyber alerts and incidents
- Must have professional engagement and customer service skills to positively support stakeholder institutions and partners statewide
- Fast learner; ability to work and solve problems creatively
- Two years of experience in a security operations environment, or related work and demonstrated interest in security operations