Cybersecurity Analyst L2

Overview

On Site
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - Long Term

Skills

Data Link Layer
Performance Management
Project Management
Preventive Maintenance
Cyber Security
Threat Analysis
Vulnerability Management
Management Reporting
Scheduling
Incident Management
Network
Documentation
Policies and Procedures
Security Analysis
Security Operations
Computer Science
IT Security
Intrusion Detection
Content Development
Network Security
NetFlow
Computer Networking
IDS
SEIM
Log Analysis
Scripting
EXT
IMG

Job Details

Cybersecurity Analyst L2

Greensboro, North Carolina- Days are M-F 2pm to 10pm

18 Month contract

We are actively seeking an experienced Cyber Defense Incident Responder to join our Cybersecurity Operations Center in Greensboro, NC. In this role, you will be responsible for analyzing data, developing incident response processes, conducting in-depth analysis of network and endpoint data, and incorporating threat intelligence to enhance detection and mitigation strategies.

What you will do

Complete Cyber Monitoring and Incident Response Operations Playbook/Checklist activities including, but not limited to: log review, vulnerability management activities, management report scheduling and running, alert analysis, filter modifications and escalation follow up activity status

Guide and coordinate internal and third-party incident response

Develop, tune and maintain tools to automate analysis capabilities for network-based, host-based and log-based security event analysis. Create signatures, rulesets, and content analysis definitions from various intelligence sources for a variety of detection capabilities

Organize and maintain documentation of detection capabilities, alert definition, policy configurations, and tool rulesets

Maintain adherence to Corporate Security Operations Center standards, policies and procedures

Remain up-to-date on the latest security information in order to validate the security analysis and identification capabilities of the security operations technologies

Participate in efforts to analyze and define security filters and rules for a variety of security parameters

What you Bring

Bachelor's degree in computer science or a related 4-year technical degree, or 3-6 years of relevant IT experience

2-4 years of IT Security experience

Core Technical: Intrusion Detection, NetFlow Analysis, Log Analysis, Rule/Signature/Content Development, programming or scripting required.

Exhibits understanding and application of the principles of Network Security Monitoring (NSM). Ability to :

Analyze log data, NetFlow data, alert data, network traffic and other data sources to validate security events.

Create signatures and detection content in IDS, SEIM and Log analysis platforms.

Consume, comprehend and utilize and create indicators of compromise.

Tune detection tools for accuracy.

Execute on intelligence-driven detection capabilities.

Perform daily analysis of detection reports and alerts.

Maintain tools, scripts and applications for detection and automation capabilities.

Ayush Sharma Sr. US Technical Recruiter

| Ext:149

| G-talk:

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.