Job2020-05-22T15:36:40-07:00

Cyber Security Analyst

Reference: 1464

Location Long Beach, CA
Work Type
Category
Start Date
Duration

Job Description

Our client, a global information technology company in Long Beach, is seeking to hire a Cyber Security Analyst on a full time basis. You will be responsible for investigating computer related incidents within the organization. You will use your expertise to respond to and\or triage the security threat, work with CSIRT to mitigate the damages, and thoroughly investigate the situation.

Responsibilities:

  • Understanding, acknowledgment and willingness to perform in a 24x7x365 environment
  • Ability to travel as needed to attend information security meetings
  • Strong understanding and experience with SIEM (Splunk), Carbon Black, Cylance, Tenable Nessus
  • Experience with Incident Response strategy; i.e. detect, triage, respond, contain\eradicate, refine & report
  • Familiar with Malware analysis; i.e. sandbox detonation
  • Participate in drafting and reviewing incident response process documentation
  • Coordinate response, escalation, tracking and analysis of incidents at remote offices
  • Conduct advanced computer and network forensic investigations relating to various forms of malware, computer intrusion, data breaches, etc.
  • Participate in threat hunting activities to proactively search for threats in the enterprise environment
  • Keep up to date on latest information security threats and countermeasures
  • Recommend security enhancements and purchases consistent with information security strategy and evolving threats
  • Provide forensic analysis of network packet captures, DNS, proxy, Netflow, malware, host-based security and application logs, as well as
  • logs from various types of security sensors
  • Assist in identifying and remediating gaps as identified throughout the investigation
  • Review log-based data, both in raw form and utilizing SIEM or aggregation tools
  • Liaison with Managed Security Services provider

Qualifications:

  • Bachelor's degree in Computer Science (or related engineering degree)
  • 3-5 years of information systems security (or cyber security) experience
  • In depth knowledge of Information Security incident handling and investigation procedures
  • Demonstrated skills in conducting forensic analysis of digital evidence, network traffic, managing event analysis/correlation and related incident investigations
  • Working knowledge of security operations: perimeter defense, forensics, incident response, kill chain analysis, risk assessment and security metrics.
  • MUST HAVE: Strong experience with Carbon Black, Splunk, Splunk Programming Language
  • Preferred Certifications: CISSP, CEH, CCFP, SANS
  • Strong Understanding of risk-based and one or more of the following frameworks: PCI-DSS, Sarbanes Oxley, HIPAA, FISMA, ISO, COBIT, or NIST
  • Technical skills proficiency in the following areas: security information event management, network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection
  • Excellent teamwork skills and the ability to successfully interface with other organizational groups

 

Submit Application

IT Business*
IT Infrastructure*
IT APP/ Dev*

VIEW ALL LISTINGS