Sr. Security Analyst

Overview

On Site
USD 90,000.00 - 130,000.00 per year
Full Time

Skills

Professional Services
Network Monitoring
Intrusion Detection
IDS
IPS
Firewall
Research
Content Development
Machine Learning (ML)
Network
Cloud Computing
Management
Sensors
Incident Management
Collaboration
Threat Analysis
Evaluation
Kibana
Enterprise Search
Network Protocols
Encryption
Analytical Skill
Python
Windows PowerShell
Content Creation
Dashboard
Communication
Reporting
Stakeholder Engagement
Conflict Resolution
Problem Solving
CISSP
Certified Ethical Hacker
GCIH
Cyber Security
Security Operations
System On A Chip
SIEM
Scripting
Network+
SEC
GSEC
SAP BASIS
Law
FOCUS

Job Details

Job Description

ECS is seeking a Sr. Security Analyst to work in our Scott AFB, IL office. Please Note: This position is contingent upon contract award.

As a leading managed cybersecurity services provider, ECS delivers a highly tailored and customized offering to each customer. The Professional Services Team is responsible for working with our customers to understand their needs and delivering a complete solution. We will leverage your unique skills to help solve customers' challenges, such as engineering a system to address a technical hurdle, protecting customer data, or consulting on a wide range security topics. You are empowered to engage and lead across multiple groups and must have the self-sufficiency and focus to work well without constant oversight.

This role requires a blend of technical proficiency with Elastic SIEM, cybersecurity principles, and strong analytical capabilities to effectively protect against and respond to cyber threats. The candidate should also possess excellent interpersonal skills to communicate complex security issues to a broad audience effectively.

Responsibilities:
  • Network Monitoring and Intrusion Detection: Perform analysis using various defense tools, including IDS/IPS, firewalls, and host-based security systems.
  • SIEM Management: Utilize Elastic SIEM to correlate events and identify indicators of threats, creating actionable intelligence.
  • Threat Research: Investigate emerging threats and vulnerabilities to enhance incident identification processes.
  • Threat Detection: Implement both log-based and endpoint-based detection strategies to identify and mitigate threats from multiple sources.
  • Content Development: Develop and customize SIEM content such as machine learning rules, signatures, and dashboards according to customer requirements.
  • Activity Correlation: Correlate data across network, cloud, and endpoints to identify attacks and unauthorized actions.
  • Alert Management: Review and respond to alerts from SIEM and other sensors; document incidents in formal, technical reports.
  • Phishing Analysis: Analyze phishing email submissions to determine threat levels and appropriate responses.
  • Incident Response Support: Provide effective incident response and mitigation strategies to contain and rectify breaches.
  • Threat Intelligence Integration: Collaborate with threat intelligence and threat-hunting teams to maintain up-to-date knowledge of threat landscapes.
  • Tool Evaluation: Assist in assessing new security tools and analytical techniques for integration into managed security services.
  • Breach Investigation: Support both large-scale and smaller-scale cyber breach investigations.
  • Stakeholder Communication: Effectively communicate cyber events and findings to both internal and external stakeholders.
Salary Range: $90,000 - $130,000

General Description of Benefits

Required Skills

  • 2+ years of cyber experience
  • Deep Knowledge of Elastic SIEM: Proficient in using Elastic SIEM for monitoring, threat detection, and response. Experience with using Kibana, Logstash, Ingest Pipelines, Enterprise Search or Observability preferred.
  • Cybersecurity Expertise: Strong understanding of network protocols, encryption, and vulnerabilities.
  • Analytical Skills: Ability to analyze complex data from various sources to deduce patterns and detect anomalies.
  • Programming/Scripting: Familiarity with scripting languages like Python or PowerShell to automate tasks and manipulate data.
  • Content Creation: Experience in creating and tuning SIEM rules, signatures, and dashboards.
  • Communication Skills: Excellent written and verbal communication skills for reporting and stakeholder engagement.
  • Problem-Solving: Strong problem-solving skills with the ability to work under pressure in a fast-paced environment.


Desired Skills

  • Certifications: Preferred certifications include CISSP, CEH, GCIH, or Elastic Certified Analyst.
  • Experience: Previous experience in a cybersecurity operations center (SOC) environment is highly desirable.
  • Prior experience working as an analyst in a Security Operations Center (SOC).
  • Prior experience working EDR, SIEM, SOAR, and ticketing technologies.
  • Knowledge of threat actor tactics, techniques, and procedures (TTPs).
  • Ability to support ad hoc scripting in any language.
  • Possess an industry-recognized entry-level certification (e.g., A+, Net+, Sec+, GSEC, etc.)

ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.

ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.