The Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. An Analyst is required to be flexible and adapt to change quickly. The Analyst will work closely with our Technology Analysts and Architects to service customers.
Analyze, document and report on potential security incidents identified in customer environments
Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets
Act as a coordinator for security events that require urgent response, containment and remediation
Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
Perform knowledge transfers, document and train clients regarding mitigation of identified threats
Provide ongoing recommendations to other MSS peers and customers on tuning and best practices
Actively research current threats and attack vectors being exploited in the wild
Actively work with associate analysts and perform investigations
Development of KB's and SOP's
Performs other duties as assigned
Complies with all policies and standards
2-4 years full-time professional experience in the Information Security field required
2-4 years’ experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment required
2-4 years’ experience working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, Remedy Force, Heat, etc.). preferred
Ability to generate comprehensive written reports and recommendations
Write professional emails, Coaching and training experience
Previous experience as a point of escalation in a technical environment
Customer interactions and creation of executive presentations
Understanding of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV
Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem
Queue management
IDS monitoring/analysis with tools such as Sourcefire and Snort
Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus
Attack vectors and exploitation, Mitigation, Active Directory
Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks
Familiarity with SANS top 20 critical security controls
Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos or Trend Micro
Ability to identify common false positives and make suggestions on tuning
Propagation of malware in enterprise environments
Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
Familiarity with concepts associated with Advanced Persistent Threats and "targeted malware"
Experience with malware protection tools such as FireEye a plus.
Understanding of malware mitigation controls in an enterprise environment.
Network Based Attacks / System Based Attacks, Denial of Service Attacks, HTTP Based DoS Attacks, Network Based DoS Attacks, Brute force attacks
Covert channels, egress, and data exfiltration techniques
This team provides 24/7 support. This role requires shift flexibility, including the ability to rotate between days, mids, and nights.
This role is Work from Office role