Artechinformationsystemllc

Artechinformationsystemllc

Information Security Analyst

Role

Information Security Analyst

Job type

Contract

Posted

118 months ago

Share this job

Salary

Not disclosed by employer

Job description

Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months

Job Description: Essential Job Functions

  • Monitor Security Events from IDS, SIEM, etc.
  • Log tickets to the Ticketing System
  • Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members
  • Perform triage on alerts from all sources including Monitored Email Distribution Lists
  • Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
  • Produce ad hoc reports and other ad hoc tasks

Required Skills/Abilities:

  • Monitoring skills related to IDS and SIEM
  • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
  • Understanding of Windows Registry, File system, etc.
  • Hands-on knowledge of Network Packet Analysis using tools
  • Ability to work with team members with varying levels of technical skills and diverse international backgrounds
  • Strong understanding of Networking and Operating systems concepts
  • Ability to adapt to and function in a project environment with multiple timetables and changing priorities
  • Ability to learn new concepts and approaches in Analyzing Security Incidents.
  • Good communication skills (Verbal and Written)

Educational Qualifications and Experience:

  • Education: Bachelor's degree in Computer Science or Information Systems
  • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
  • Experience with Firewalls and information security technologies
  • Experience with CERT/CSIRT/CIRT/SOC

Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA

Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis

Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact

Experience Matrix for Levels:

  • Level I - 2+ years of experience
  • Level II - 5+ years of experience
  • Level III - 7+ years of experience

Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview

For more information, Please contact

Siva Kumar

973-507-7543

Resume ExampleCover Letter Example

Explore more