• Snapboard
  • Activity
  • Reports
  • Campaign
Welcome ,

Chat with the recruiter

...Minimize

Hey I'm Online! Leave me a message.
Let me know if you have any questions.

Senior Security

In United States

Save this job

Senior Security   

Click on the below icons to share this job to Linkedin, Twitter!

JOB TITLE:

Senior Security

JOB TYPE:

JOB SKILLS:

JOB LOCATION:

Washington United States

JOB DESCRIPTION:

Job description:

  • This is currently a REMOTE SHIFT (swing/night) position in our SOC, but return to Washington D.C. in a part-time on-site capacity once COVID-19 restrictions are eased.
  • We specifically need someone who can do several weeks of training with our day shift and then take a lead role within a small cyber security team.
  • Swing shift is 3p-11p Sun-Thurs or 3p-11p Tues-Sat. Night is on the same day of week patterns but runs from 11p-7a.

 

Experience in computer forensics is strongly preferred. See the list of qualifications listed under preferred qualifications.

 

7-10 Years Experience in Cyber Operations, Engineering, and Incident Response

 

  • At least 6 years of experience as a security operations center (SOC) analyst
  • Successful candidate must be a motivated self-starter with a highly inquisitive and analytic mindset.
  • Relevant cybersecurity subject matter expertise - especially in information security, network security, security event triage, intrusion analysis, malware, computer networking TCP/IP, and anomalous behavior.
  • Experience and skills in: continuous monitoring, information security alerting, security event triage, intrusion analysis, threat trends, malware, and anomalous behavior.
  • Demonstrated experience with security information and event management (SIEM - Qradar is a Plus), security orchestration and automated response (SOAR - Demisto/PaloAlto XSOAR is a plus), and other security technologies.
  • Experience in, or willingness to quickly learn, at least one security tool type such as IDS(PaloAlto Threat Threat Protection/Wildfire is a plus/IPS (Cisco Source Fire is a plus), network access control (Forescount is a plus), firewall (PaloAlto PAN is a plus), anti-malware (CarbonBlack EDR and CrowdStrike Falcon is a plus), etc
  • Experience with the MS Cloud Security Apps, Office 365 EPO (Sentinel is a Plus).
  • Attention to detail and excellent analytical and problem-solving skills.
  • Advanced written and verbal communication skills.
  • Excellent organizational skills and ability to set priorities and handle multiple projects concurrently.
  • Excellent analytical and problem-solving skills
  • Teamwork and collaboration skills are critical. This is not a position for someone who prefers to work alone.
  • This position requires a bachelors degree in Cyber Security, Information Technology, Computer Science, Business or relevant work experience in application security analysis, systems analysis and/or testing background and experience with direct Business Analyst experience.
  • Excellent interpersonal skills including the ability to build consensus and agreement and bring resolution to contentious issues and entrenched interests.
  • Must demonstrate understanding of industry standard security best practices
  • Excellent knowledge of MS Office tool set - MS Word, MS Excel, MS Project and MS Visio.
  • Excellent knowledge of MS PowerBI, PowerShell, and other Office365 Applications.

 

Preferred:

  • Security Certifications.
  • One or more of the following qualifications: GIAC Certified Forensic Analyst (GCFA) GIAC Advanced Smartphone Forensics (GASF) GIAC Certified Forensic Examiner (GCFE) GIAC Network Forensic Analyst (GNFA) GIAC Reverse Engineering Malware (GREM) One or more of the following training: FOR500: Windows Forensic Analysis FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics FOR509: Enterprise Cloud Forensics and Incident Response FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
  • Passion for Cyber Security.
  • Hands on experience with some or all: NetFlow and full packet capture technology, Intrusion Detection Systems (IDS), firewalls, AV, and other similar network security tools
  • Experience with healthcare insurance industry, especially Top healthcare organization plans.
  • Effective presentation, negotiation and influencing skills to interface with all levels of management and to facilitate large meetings across the Client organization.
  • Advanced written and verbal communication skills are critical.

 

This job is for a lead cyber security analyst / incident responder who will perform in-depth analysis on security events, intrusion detection, malware analysis, threat hunting and all phases of security event monitoring and incident response. Job will require complete monitoring, triage and incident response functions in a combined SOC/CIRT environment. Will use advanced SOC / CIRT security platforms and processes on a daily basis. Training will be given on specific platforms; however, candidate should be an expert in SOC / CIRT processes and general platforms already. Job will entail working closely with team members to run an investigation from start to finish, ensuring collaboration with any appropriate teams and stakeholders at all levels, there will be occasional presentations, audit support and regular documentation of investigations and project deliverables so strong verbal and written communications skills are critical.

 

Position Details

POSTED:

Sep 30, 2022

EMPLOYMENT:

INDUSTRY:

SNAPRECRUIT ID:

S16533504240711644

LOCATION:

United States

CITY:

Washington

Job Origin:

OORWIN_ORGANIC_FEED

A job sourcing event
In Dallas Fort Worth
Aug 19, 2017 9am-6pm
All job seekers welcome!

Senior Security    Apply

Click on the below icons to share this job to Linkedin, Twitter!

<p><strong><span>Job description: </span></strong></p> <ul style="margin-top:0cm;" type="disc"> <li data-level="1" data-list="1" style="margin-left:0cm;"><span><strong>This is currently a REMOTE SHIFT (swing/night) position in our SO</strong><strong>C, but return to Washington D.C. in a part-time on-site capacity once COVID-19 restrictions are eased.</strong> </span></li> <li data-level="1" data-list="1" style="margin-left:0cm;"><span>We specifically need someone who can do several weeks of training with our day shift and then take a lead role within a small cyber security team. </span></li> <li data-level="1" data-list="1" style="margin-left:0cm;"><span>Swing shift is 3p-11p Sun-Thurs or 3p-11p Tues-Sat. Night is on the same day of week patterns but runs from 11p-7a.</span></li> </ul> <p><span> </span></p> <p><span><strong>Experience in computer forensics is strongly preferred. See the list of qualifications listed under preferred qualifications.</strong></span></p> <p><span> </span></p> <p><span>7-10 Years Experience in Cyber Operations, Engineering, and Incident Response</span></p> <p><span> </span></p> <ul style="margin-top:0cm;" type="disc"> <li data-level="1" data-list="3" style="margin-left:0cm;"><span>At least 6 years of experience as a security operations center (SOC) analyst</span></li> <li data-level="1" data-list="3" style="margin-left:0cm;"><span>Successful candidate must be a motivated self-starter with a highly inquisitive and analytic mindset.</span></li> <li data-level="1" data-list="3" style="margin-left:0cm;"><span>Relevant cybersecurity subject matter expertise - especially in information security, network security, security event triage, intrusion analysis, malware, computer networking TCP/IP, and anomalous behavior.</span></li> <li data-level="1" data-list="3" style="margin-left:0cm;"><span>Experience and skills in: continuous monitoring, information security alerting, security event triage, intrusion analysis, threat trends, malware, and anomalous behavior.</span></li> <li data-level="1" data-list="3" style="margin-left:0cm;"><span>Demonstrated experience with security information and event management (SIEM - Qradar is a Plus), security orchestration and automated response (SOAR - Demisto/PaloAlto XSOAR is a plus), and other security technologies.</span></li> </ul> <ul style="margin-top:0cm;" type="disc"> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Experience in, or willingness to quickly learn, at least one security tool type such as IDS(PaloAlto Threat Threat Protection/Wildfire is a plus/IPS (Cisco Source Fire is a plus), network access control (Forescount is a plus), firewall (PaloAlto PAN is a plus), anti-malware (CarbonBlack EDR and CrowdStrike Falcon is a plus), etc</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Experience with the MS Cloud Security Apps, Office 365 EPO (Sentinel is a Plus).</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Attention to detail and excellent analytical and problem-solving skills.</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Advanced written and verbal communication skills.</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Excellent organizational skills and ability to set priorities and handle multiple projects concurrently.</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Excellent analytical and problem-solving skills</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Teamwork and collaboration skills are critical. This is not a position for someone who prefers to work alone.</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>This position requires a bachelors degree in Cyber Security, Information Technology, Computer Science, Business or relevant work experience in application security analysis, systems analysis and/or testing background and experience with direct Business Analyst experience.</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Excellent interpersonal skills including the ability to build consensus and agreement and bring resolution to contentious issues and entrenched interests.</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Must demonstrate understanding of industry standard security best practices</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Excellent knowledge of MS Office tool set - MS Word, MS Excel, MS Project and MS Visio.</span></li> <li data-level="1" data-list="0" style="margin-left:0cm;"><span>Excellent knowledge of MS PowerBI, PowerShell, and other Office365 Applications.</span></li> </ul> <p><strong><span> </span></strong></p> <p><strong><span>Preferred:</span></strong></p> <ul style="margin-top:0cm;" type="disc"> <li data-level="1" data-list="2" style="margin-left:0cm;"><span>Security Certifications.</span></li> <li data-level="1" data-list="2" style="margin-left:0cm;"><span>One or more of the following qualifications: GIAC Certified Forensic Analyst (GCFA) GIAC Advanced Smartphone Forensics (GASF) GIAC Certified Forensic Examiner (GCFE) GIAC Network Forensic Analyst (GNFA) GIAC Reverse Engineering Malware (GREM) One or more of the following training: FOR500: Windows Forensic Analysis FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics FOR509: Enterprise Cloud Forensics and Incident Response FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response</span></li> <li data-level="1" data-list="2" style="margin-left:0cm;"><span>Passion for Cyber Security.</span></li> <li data-level="1" data-list="2" style="margin-left:0cm;"><span>Hands on experience with some or all: NetFlow and full packet capture technology, Intrusion Detection Systems (IDS), firewalls, AV, and other similar network security tools</span></li> <li data-level="1" data-list="2" style="margin-left:0cm;"><span>Experience with healthcare insurance industry, especially Top healthcare organization plans.</span></li> <li data-level="1" data-list="2" style="margin-left:0cm;"><span>Effective presentation, negotiation and influencing skills to interface with all levels of management and to facilitate large meetings across the Client organization. </span></li> <li data-level="1" data-list="2" style="margin-left:0cm;"><span>Advanced written and verbal communication skills are critical.</span></li> </ul> <p><span> </span></p> <p><span>This job is for a lead cyber security analyst / incident responder who will perform in-depth analysis on security events, intrusion detection, malware analysis, threat hunting and all phases of security event monitoring and incident response. Job will require complete monitoring, triage and incident response functions in a combined SOC/CIRT environment. Will use advanced SOC / CIRT security platforms and processes on a daily basis. Training will be given on specific platforms; however, candidate should be an expert in SOC / CIRT processes and general platforms already. Job will entail working closely with team members to run an investigation from start to finish, ensuring collaboration with any appropriate teams and stakeholders at all levels, there will be occasional presentations, audit support and regular documentation of investigations and project deliverables so strong verbal and written communications skills are critical.</span></p> <p><span> </span></p>


Please wait..!!