Cyber Security Analyst

Overview

On Site
Full Time

Skills

Network security
IMPACT
Threat analysis
Case management
Incident management
Reporting
Regulatory Compliance
Metrics
Auditing
Business continuity planning
Disaster recovery
Change management
Information security
Research
Security operations
System administration
CISSP
OSCP
SEC
Certified Ethical Hacker
Scripting
Python
Bash
Windows PowerShell
National Institute of Standards and Technology
OWASP
SANS
NIST 800-53
ISO/IEC 27001:2005
CSC
Policies
Data security
SIEM
IDS
IPS
AV
Audiovisual
DLP
Microsoft Windows
Linux
Operating systems
Computer networking
Network
Cyber security
Vulnerability management
Qualys
Microsoft Azure
Amazon Web Services
Supervision
Communication
Customer focus
Management

Job Details

Cybersecurity Analyst

Responsibilities:
  • Establish and enhance the Cybersecurity program, implementing projects that reduce risk and satisfy business security requirements.
  • Monitor, research and classify security events and incidents triggered by endpoint and network security tools.
  • Maintain and follow runbooks / playbooks for security event alerts and incidents.
  • Analyze and share Threat Intelligence and determine impact for the organization.
  • Implement and maintain the Threat Intelligence Platform for curated threat intelligence and case management.
  • Develop and coordinate processes for Continuous Logging and Monitoring, SIEM, and Incident Response.
  • Monitor and report on emerging risk and compliance with organizational security policies.
  • Enhance key performance indicators, metrics, and ongoing monitoring.
  • Support internal and external audits and assessments and recommend appropriate mitigations to treat identified risks.
  • Support the Vulnerability Management program by conducting recurring scans of all systems and applications, providing guidance to IT teams for the remediation of identified vulnerabilities.
  • Participate in business continuity and disaster recovery planning, as well as change management forums.
  • Stay current on topics in Information Security by researching emerging trends, technologies, threats, and vulnerabilities.

Experience:
  • Minimum of 1 to 2 years' experience in Security Operations and/or other IT-related fields (Networking, Systems Administration).
  • Bachelor's Degree in a technology field preferred.
  • Certification in one or more areas, or willingness to obtain: BTL1, CISSP, GIAC, OSCP, Sec+, CEH or similar.
  • Familiarity with scripting (Python, Bash and/or PowerShell).
  • Familiarity with the NIST Cybersecurity Framework, MITRE ATT&CK, OWASP Top 10, CWE/SANS Top 25, NIST 800-53, ISO 27001/27002, and CIS CSC.
  • Experience developing and maintaining policies, procedures, standards, and guidelines.
  • Experience working in a regulated environment preferred.
  • Keen understanding of Cybersecurity and Data Protection tools including SIEM, IDS/IPS, AV/EDR, NDR, DLP and other technologies
  • Understanding of Windows and Linux Operating Systems and networking protocols.
  • Experience analyzing system and network traffic for suspicious activity.
  • Ability to effectively convey complex security concepts to multiple audiences, including business and technical leaders and contributors.
  • Experience defining, implementing, and improving Cybersecurity standards, controls, and procedures.
  • Experience with commercial Vulnerability Management tools (i.e. Tenable, Rapid7, Qualys) a plus.
  • Familiarity with Azure and AWS environments.
  • Comfortable working with a variety of technologies supporting large scale deployments, troubleshooting solutions issues, and proficient in monitoring and investigating security events.
  • Self-motivated and team oriented, with the ability to drive initiatives under minimal supervision.
  • Excellent verbal, written, and interpersonal communication skills.
  • Strong customer / client focus, with the ability to manage expectations appropriately.
#RecruitPS
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.