Create a Job Alert.

Enter your email below to save this search and receive job recommendations for similar positions.
Thank you. We'll send jobs matching these to
You already suscribed to this job alert.
US
0 suggestions are available, use up and down arrow to navigate them
What job do you want?

Create Job Alert.

Get similar jobs sent to your email

List of Jobs

Apply to this job.
Think you're the perfect candidate?
Apply Now
IT Security Analyst III at Experis

IT Security Analyst III

Experis Columbia, SC
Apply Now

Duration: Contract to Hire
Location: Must work onsite: Columbia, SC 29210
Must be Experis W2 Candidate

Description:

The senior Managed SOC Analyst's primary function is to provide professional security operations center (SOC) analysis associated with customer monitoring activities through the processing and management of incident and request tickets, as they are assigned. The role is responsible for investigating novel and complex threats, developing knowledge, playbooks, and automation.
Deeper dives into threat hunting are also in scope. The responsibilities include receiving and managing escalations from other Analysts, customers, and other internal groups, as well as managing the full incident handling lifecycle with customers. The analyst is expected to contribute to internal documentation and adherence to SLA targets and requirements. The role includes forensic log root cause analysis and interfacing with clients and associates as needed to resolve complex cases. Senor Analysts are expected to participate in and contribute to planning and implementation of strategic and operational projects in efforts to achieve overall PSS goals. Senior analysts are expected to be able to troubleshoot complex problems with little oversight, take ownership and work independently as needed to resolve customer issues.

Duties and Responsibilities:

  • Serve as escalation point in the SOC
  • Proactively drive hunting and analysis on behalf of multiple clients
  • Leverage internal and external resources and threat intelligence feeds to research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure
  • Investigate novel and complex threats, then develop knowledge, playbooks, and automation.
  • Develop new use cases and playbooks/SOPs, as well as automation for recurring incidents and incident tasks
  • Improve DFIR processes and procedures to reduce false position alerts
  • Collaborate with technical and business SMEs to identify gaps to enhance security monitoring
  • Maintain Industry Training - This involves keeping up-to-date on security technologies, threats, and risk mitigation techniques
  • Maintain Knowledge of Current Threats - Keep up-to-date on current threats by regularly reading industry-related articles
  • Enhance vSOC with advanced skill sets such as SOC automation and orchestration to optimize SOC resource allocation
  • Case Management - ensuring the case management process is handled efficiently in a timely manner by all SOC personnel
  • SOC Activity Log -creating, reviewing, and maintaining entries, working with other analysts Report Creation - creating temporary or permanent reports for customers, as requested.
  • Customer Meetings - attending and/or leading customer meetings as part of incident response and incident handling
  • Training and Mentoring SOC personnel - Security Analysts are responsible for training new SOC employees; also responsible for training and mentoring existing SOC personnel on new technologies implemented by CenturyLink; also responsible for retraining SOC personnel, if necessary
  • Tuning - regularly performing tuning and filtering SIEM alerts and monitoring components to ensure only relevant security data is gathered
  • System Maintenance - assisting SOC Engineers with maintenance on security devices, as needed
  • Projects - May lead moderately complex security projects as assigned
  • Interface with customers on a daily basis to consult with them on best security practices and help them mature their security posture
  • Gain and maintain knowledge of Customer's business and technical environment
  • Communicate incidents at an appropriate level of details with all levels of the organization

    Shift Responsibilities:
    The Security Analyst is responsible for the following shift duties:
  • Daily Traffic Review - replaying traffic from previous shifts and reviewing customer reports to ensure potential security incidents were not missed by a Level 1 Analyst
  • Report Run Verification - ensure customer reports run as scheduled
  • Improve their knowledge of the customer environment, intrusion detection, methodologies, and intrusion detection services with the support of on-going training from the analysts and self-study
  • Review SOC Activity log, cases and other monitoring tools for complete understanding of previous shift activities and incidents
  • Handle Tier 2 event incident response, case management, and customer notification
  • Ensure security devices contain up-to-date signatures libraries
  • Assist with engineering tasks as necessary
  • Train SOC Level 1 Analysts on new attack signatures and attack methodologies
  • Providing process and operational improvement suggestions
  • Review and update documentation (such as SOPs and TTPs)
  • Complete vendor training as requested by Management
  • Daily Case Management - the Security Analyst will review open cases and provide follow up that may be required

    Qualifications:
  • 5+ years of Information Security experience
  • Expertise experience in Splunk preferred
  • Strong understanding of security principles such as attack frameworks, threat landscapes, attacker TTPs, etc.
  • Working experience with integration with different security systems and devices
  • 3+ years coding and scripting experience in Python, Linux shell scripting or Windows PowerShell scripting etc.
  • Working experience and knowledge of SOAR platforms and solutions
  • 2-4 years of systems analysis
  • Working knowledge of Linux and syslog from CLI
  • Proven ability and past experience performing moderately complex security analysis for information technology is required
  • Excellent writing and communications skills
  • Familiarization with a variety of information and network security monitoring tools (ArcSight SIEM, QRadar SIEM, Splunk, Arbor DDoS Mitigation, Cisco IDS/IPS, Netcool, and Imperva WAF, among others)
  • Ability to work in a dynamic team-centered environment

    Education Preferred:
  • Bachelor's Degree in Computer Information Systems or related field

    Industry Certifications:
    All Analysts should possess the background and experience necessary to obtain Industry or SOC specific certifications as instructed by management. Possible applicable certifications include, but are not limited to:
  • Certified Information Systems Security Professional (CISSP)
  • Information Systems Security Engineering Professional (CISSP-ISSEP)
  • Systems Security Certified Practitioner (SSCP)
  • CompTIA Security+
  • Certified Ethical Hacker (CEH)
  • Certified Security Analyst (ECSA)
  • Certified Incident Handler (ECIH)
  • CompTIA Cybersecurity Analyst (CSA+)
  • Information Technology Infrastructure Library (ITIL)
  • Cisco CCNA
  • Cisco CCNP + Security
  • GSEC
  • GCIH
  • GCIA
  • MCSE
  • Linux+

    Work Experience:
  • 2-3 years of Managed Security Service Provider (preferred)
  • 3-4 years of senior SOC analyst experience
  • Threat Intelligence or Forensic background is a plus
 

Recommended Skills

  • Ec Council Certified Security Analyst
  • Giac Certified Intrusion Analyst
  • Certified Ethical Hacker
  • Information Systems Security Engineering Professional
  • Giac Certified Incident Handler
  • Certified Information Systems Security Professional
Apply to this job.
Think you're the perfect candidate?
Apply Now

Help us improve CareerBuilder by providing feedback about this job:

Job ID: BBBH59194

CareerBuilder TIP

For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.

By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.