Information Security Analyst

Overview

Remote
Depends on Experience
Contract - Independent
Contract - W2
Contract - 30 Month(s)

Skills

Information Security
security-related role
Cyber Security technologies
threat landscape and indicators of compromise

Job Details

Job Title: Information Security Analyst

Work Location: Ashburn VA or Cary NC or Temple Terrace FL (Remote)

Duration: Long Term Contract

Job Description:

****LOCATION: Must be 60 miles from Ashburn VA, Cary NC, or Temple Terrace FL.

****100% REMOTE MODEL: Night Shift 12:00 AM 08:00 AM EST, 5 days a week, including weekends.

Job Duties:

  • Information Security Analysts are the backbone of the Security Operations Center (SOC), providing crucial support to enterprise-level customers.
  • Tier-1 Security Analysts with at least one year of experience in security or technical troubleshooting roles, such as help desk, handle various tasks across various platforms.
  • They play a pivotal role in the Security Incident and Event Management (SIEM) workflow, serving as the 24x7 "eyes on glass" who monitor alerts and escalate incidents as necessary.

Responsibilities:

  • Conduct near real-time security monitoring in a 24x7 environment, utilizing proprietary SIEM and cybersecurity tools to identify Indicators of Compromise (IOCs).
  • Monitor alert health in near real-time and escalate critical alerts according to service level agreements.
  • Detects and analyzes security incidents, particularly complex or escalated events, to assess threats effectively.
  • Address customer Requests for Information, leveraging soft and technical skills to query raw logs for IOCs, provide insights into SOC infrastructure, and offer guidance on SIEM features and best practices.
  • Perform level 1 assessment of incoming alerts, prioritizing and correlating details to determine severity within the customer environment and coordinating with tier II/III for critical incidents as needed.
  • Execute basic incident response activities using customer SIEM and cybersecurity toolkits.
  • Contribute to the SOC Knowledge Base and provide input for revisions.
  • Draft clear and concise escalation tickets.

Must Have Skills:

  • Associate degree in Computer Science, Information Security, or a related field.
  • 1 to 3 years of experience in a security-related role.
  • Fundamental knowledge of Cyber Security technologies.
  • Understanding of the threat landscape and indicators of compromise.
  • Strong problem-solving skills.
  • Proactively engage with customers, client executives, and management teams.
  • Excellent documentation and communication abilities in written and oral English.

Desired Skills:

  • Bachelor's degree or higher in Computer Science, Information Security, or a related field.
  • One or more years of experience in an Information Security Analyst position.
  • Familiarity with basic cyber threat hunting techniques.
  • Experience in incident response using different SIEMs and adhering to industry best practices.
  • Proficiency in investigating security incidents, developing/tuning use cases, and understanding incident response protocols.
  • Ability to create new content, searches, and scripts for tools like Splunk, QRadar, Sentinel, etc.
  • Understanding of device logging, network troubleshooting, and device troubleshooting.
  • Experience with incident response techniques such as network forensic analysis.
  • Familiarity with Intrusion Prevention Systems (IPS) and analyzing alerts generated by inspection.
  • Scripting knowledge in languages like Python, PowerShell, Bash Shell, Java, Ansible, etc.
  • Relevant security certifications such as SANS GIAC, GCIH, CompTIA Security+, CCNP-Security, CySA+, GCED, CEH, or similar credentials.

Thank you! Bharath RP, Ph: x 121

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.