Mid Level Cyber Security Analyst

Tempe, AZ, US • Posted 14 hours ago • Updated 2 hours ago
Contract Independent
On-site
USD $45.00 - 50.00 per hour
Company Branding Image
Fitment

Dice Job Match Score™

⏳ Almost there, hang tight...

Job Details

Skills

  • IT Operations
  • Cyber Security
  • Security Operations
  • Commodities
  • Malware Analysis
  • System On A Chip
  • Threat Analysis
  • Risk Management
  • Issue Tracking
  • Collaboration
  • eXist
  • SIEM
  • IDS
  • Documentation
  • Standard Operating Procedure
  • Team Leadership
  • Management
  • Mentorship
  • Routing
  • CompTIA
  • Network+
  • Security+
  • Packet Analysis
  • Information Security
  • Computer Networking
  • Firewall
  • Routers
  • Proxies
  • Operating Systems
  • Microsoft Windows
  • Unix
  • Linux
  • Command-line Interface
  • Incident Management
  • Research
  • Analytical Skill
  • Root Cause Analysis
  • Scripting
  • Python
  • Perl
  • SQL
  • Windows PowerShell
  • React.js
  • Communication
  • Supervision
  • Multitasking
  • Computer Science
  • SANS
  • GCIH
  • GCIA
  • Privacy
  • Marketing

Summary

Location: Tempe, AZ
Salary: $45.00 USD Hourly - $50.00 USD Hourly
Description: Our client is currently seeking a Mid-Level Cyber Security Analyst

The client's Security & Technology Operations organization is seeking an Information Cyber Security Analyst for the Security Operations Center. The selected candidate will participate in a 24x7x365 team that monitors, analyzes, and responds to information security-related threats such as commodity malware, policy violations, and advanced persistent threats. Members of the SOC are also tasked with supporting the efforts of the Threat Intelligence, Risk Management, and Forensic teams. The successful candidate will be a highly technical, passionate, and self-driven individual who loves to learn, solve problems, and contribute to the advancement of the team.

What you'll do:
  • Work as part of a team of Information Security professionals supporting a global enterprise.
  • Triage and respond to concurrent information security incidents reported via SIEM, ticketing system, email, etc.
  • Perform root cause analysis, document findings and collaborate with technology/process owners to prevent future occurrences.
  • Research, analyze and understand log sources originating from security and networking devices such as firewalls, routers, proxies, anti-virus products, and operating systems.
  • Automate manual processes via scripting.
  • Perform raw data review in an effort to identify malicious activity for which signatures/content do not exist.
  • Assist with the development of new content and tuning/filtering of existing content for SIEM, IDS, and other security technologies.
  • Participate in documentation evergreen process to ensure accuracy of documentation critical to the team's success.
  • Work with management to define/update standard operating procedures and response plans.
  • Support efforts of Sr. Security Analysts, Team Lead, Technical Directors and/or Management during all phases of the Incident Response process.
What you have:
  • Minimum of 2+ Security Experience Years of professional experience, or equivalent.
  • Between 2-5 Years IT Experience Years of professional experience, or equivalent.
  • Experience as an initial point of escalation for the Security Analyst I.
  • Train, mentor, and oversight of the Security Analyst I.
  • Thorough understanding of computer networking: TCP/IP, routing and protocols.
  • CompTIA Network+ or equivalent knowledge/experience required.
  • CompTIA Security+ or equivalent knowledge/experience required.
  • Detailed knowledge of packet structure and previous experience performing in-depth packet analysis required.
  • Thorough understanding of information security best practices and technologies.
  • Detailed knowledge regarding the administration, use, securing and exploitation of common operating systems.
  • Prior experience analyzing log sources originating from security and networking devices such as firewalls, routers, proxy, anti-virus products, and operating systems required.
  • Strong proficiency with Windows and Unix/Linux command line.
  • In-depth knowledge of obfuscation techniques used to encode/encrypt malicious traffic/data.
  • Familiarity with a standardized incident response framework (SANS/NIST).
  • Research and analytical background and an analytical approach; especially with respect to event classification, event correlation, and root cause analysis.
  • Scripting experience with Python, Perl, SQL, and/or PowerShell strongly preferred.
  • Must be able to react quickly, decisively, and deliberately in high stress situations.
  • High level of ethics and core values.
  • A strong passion for learning.
  • Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers.
  • Willingness to participate in shift work.
  • Self-disciplined to ensure completion of shift work with little supervision. Highly motivated individual with the ability to self-start, prioritize, and multi-task.
Preferred but not required.
  • Associates or BS in Computer Science or equivalent experience.
  • SANS GCIH, GCIA, or equivalent industry recognized certifications


By providing your phone number, you consent to: (1) receive automated text messages and calls from the Judge Group, Inc. and its affiliates (collectively "Judge") to such phone number regarding job opportunities, your job application, and for other related purposes. Message & data rates apply and message frequency may vary. Consistent with Judge's Privacy Policy, information obtained from your consent will not be shared with third parties for marketing/promotional purposes. Reply STOP to opt out of receiving telephone calls and text messages from Judge and HELP for help.

Contact:

This job and many more are available through The Judge Group. Please apply with us today!
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: cxjudgpa
  • Position Id: 1127049
  • Posted 14 hours ago

Company Info

About Judge Group, Inc.

The Judge Group, is a leading professional services firm specializing in talent, technology, and learning solutions. We consult, staff, train, and solve. Through our work we make people and organizations better.

Our services are successfully delivered through a network of more than 30 offices across the United States, Canada, and India. The Judge Group is proud to partner with the best and brightest companies in business today, including over 60 of the Fortune 100. We serve organizations in financial services, healthcare, life sciences, insurance, government (including aerospace and defense), manufacturing, and technology and telecommunications.

About_Company_OneAbout_Company_Two
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Phoenix, Arizona

Today

Contract

USD45 - USD50

Phoenix, Arizona

Today

Easy Apply

Full-time

Tempe, Arizona

Today

Easy Apply

Contract

DOE

Phoenix, Arizona

Yesterday

Easy Apply

Contract

43 - 45

Search all similar jobs