Artechinformationsystemllc
Information Security Analyst
Company
Role
Information Security Analyst
Location
Job type
Contract
Posted
118 months ago
Salary
Job description
Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months
Job Description: Essential Job Functions
- Monitor Security Events from IDS, SIEM, etc.
- Log tickets to the Ticketing System
- Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members
- Perform triage on alerts from all sources including Monitored Email Distribution Lists
- Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
- Produce ad hoc reports and other ad hoc tasks
Required Skills/Abilities:
- Monitoring skills related to IDS and SIEM
- Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
- Understanding of Windows Registry, File system, etc.
- Hands-on knowledge of Network Packet Analysis using tools
- Ability to work with team members with varying levels of technical skills and diverse international backgrounds
- Strong understanding of Networking and Operating systems concepts
- Ability to adapt to and function in a project environment with multiple timetables and changing priorities
- Ability to learn new concepts and approaches in Analyzing Security Incidents.
- Good communication skills (Verbal and Written)
Educational Qualifications and Experience:
- Education: Bachelor's degree in Computer Science or Information Systems
- Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
- Experience with Firewalls and information security technologies
- Experience with CERT/CSIRT/CIRT/SOC
Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA
Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis
Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact
Experience Matrix for Levels:
- Level I - 2+ years of experience
- Level II - 5+ years of experience
- Level III - 7+ years of experience
Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview
For more information, Please contact
Siva Kumar
973-507-7543


