Overview
Skills
Job Details
Cybersecurity Analyst L2
Greensboro, North Carolina- Days are M-F 2pm to 10pm
18 Month contract
We are actively seeking an experienced Cyber Defense Incident Responder to join our Cybersecurity Operations Center in Greensboro, NC. In this role, you will be responsible for analyzing data, developing incident response processes, conducting in-depth analysis of network and endpoint data, and incorporating threat intelligence to enhance detection and mitigation strategies.
What you will do
Complete Cyber Monitoring and Incident Response Operations Playbook/Checklist activities including, but not limited to: log review, vulnerability management activities, management report scheduling and running, alert analysis, filter modifications and escalation follow up activity status
Guide and coordinate internal and third-party incident response
Develop, tune and maintain tools to automate analysis capabilities for network-based, host-based and log-based security event analysis. Create signatures, rulesets, and content analysis definitions from various intelligence sources for a variety of detection capabilities
Organize and maintain documentation of detection capabilities, alert definition, policy configurations, and tool rulesets
Maintain adherence to Corporate Security Operations Center standards, policies and procedures
Remain up-to-date on the latest security information in order to validate the security analysis and identification capabilities of the security operations technologies
Participate in efforts to analyze and define security filters and rules for a variety of security parameters
What you Bring
Bachelor's degree in computer science or a related 4-year technical degree, or 3-6 years of relevant IT experience
2-4 years of IT Security experience
Core Technical: Intrusion Detection, NetFlow Analysis, Log Analysis, Rule/Signature/Content Development, programming or scripting required.
Exhibits understanding and application of the principles of Network Security Monitoring (NSM). Ability to :
Analyze log data, NetFlow data, alert data, network traffic and other data sources to validate security events.
Create signatures and detection content in IDS, SEIM and Log analysis platforms.
Consume, comprehend and utilize and create indicators of compromise.
Tune detection tools for accuracy.
Execute on intelligence-driven detection capabilities.
Perform daily analysis of detection reports and alerts.
Maintain tools, scripts and applications for detection and automation capabilities.
Ayush Sharma Sr. US Technical Recruiter
| Ext:149
| G-talk: