Security Analyst

  • Pleasanton, CA
  • Posted 2 days ago | Updated 2 days ago

Overview

Hybrid
$90 - $100
Contract - W2
Contract - 1 Year(s)

Skills

security analyst
GRC
forensic analysis
active directory
siem
hardware

Job Details

We have a client in need of a Security Analyst for a one year contract.

This role may work remotely anywhere in California.

 

Objective & Deliverables

Consultant will lead staff in the implementation and execution of technical aspects of the company's Enterprise Security Plan. Consultant will continue to be the subject matter expert on security issues/projects so that ESEC team members can increase their security knowledge

The tasks for the Security Analyst include, but are not limited to, the following:

1. Proactively identify and assess threats to company users, network and data

2. Monitor and respond to reports of malicious activity

3. Respond and investigate intrusions and security events

4. Demonstrate an understanding of the company's threat landscape

5. Perform thorough analysis of attacks and anomalous network behavior

6. Provide summarized and detailed analysis and documentation in support of ESEC

7. Perform proficient forensic analysis using security tools and processes

8. Identify Actionable Intelligence by processing Threat Intelligence (TI)

9. Demonstrate ability to identify, contain, eradicate and recover from security incidents

10. Collaborate with business units, partners and individuals to mitigate security threats

11. Advise the CISO and ESEC Team on matters involving organizational, strategic, tactical, and security best practices related to forensics and security incidents management

12. Attend meetings/Represent ESEC as a Senior Lead for all security matters

13. Act as Lead/Co-Lead/Backup on assigned ESEC projects

14. Mentor junior staff colleagues

15. Create Standard Operating Procedures and training documents

 

Other duties, to be assigned as needed.

 

Technical Knowledge and Skills:

 

Minimum of 5+ years of technical experience conducting security incident response and forensic analysis.

Working experience of obtaining Cyber Threat Intelligence and making the information usable through the security incident process.

Working experience of applying IOCs to identify threats in current environment and apply information to prevent future vulnerabilities in infrastructure.

Technical security project management skills.

Working experience using best practices standards and frameworks: ISO 27001/27002; PCI DSS v4, GLBA; HIPPA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF; CIS RAM.

 

WORKING EXPERIENCE, at a minimum:

o Hardware: Network Switches, Routers, Load Balancers, Servers, Storage Systems, End-User Systems, Mobile Devices, or other devices that enable the organization to complete its mission.

o Operating Systems: UNIX, LINUX, WINDOWS.

o Network: LAN WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ

o Network Protocols: TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, etc.

o Databases: Oracle, SQL, MYSQL.

o Cloud Platforms: IAAS, PAAS, SAAS.

o Security Concepts: Encryption, Hardening, etc.

o Security GRC.

o Forensic Analysis Tools.

o Active Directory.

o Programming Languages are a plus.

o Computer Forensic experience a plus.

o Prior SIEM experience a plus.

o Malware analysis skills a plus.

Experience in managing multiple projects.

5+ Years experience in information security and forensics and/or security incident response.

CISSP and CCFP or equivalent certification desired (e.g., CCE, CHFI). Other highly desirable security certifications may be substituted for CISSP (e.g., CISA, CISM, etc.)

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.