Job Id: MI-564787 (99590710)
Security Analyst (OSCP/ CISSP) with SIEM, network protocols architecture, Bro, Suricata, Sourcefire, Snort, Wireshark, Perl, Python, PowerShell/Bash and SANS Experience
Location: 7150 Harris Dr, Dimondale, MI 48821 (DTMB- MCS)
Duration: 6 Months
Positions: 2 (2/4)
Agency Interview Type: In Person only
Years of Experience:
8 or more years of experience in the field.
SkillRequired / DesiredAmountof Experience
In-depth knowledge of security monitoring and incident responseRequired5Years
Knowledge of conducting security investigations.Required5Years
Experience with using and customizing SIEM products.Desired5Years
Solid understanding of network protocols and architecture.Required5Years
Demonstrated experience with performing digital forensics and incident response using industry leading tools.Required5Years
Experience with network intrusion detection and analysis tools such as Bro, Suricata, Sourcefire, Snort and Wireshark.Required5Years
Experience solving problems with scripting languages such as Perl, Python, PowerShell or Bash.Required5Years
Demonstrated experience operating information security tools is required.Required5Years
Demonstrated experience integrating information security tools is required.Required5Years
Understanding of the tactics, techniques and procedures of advanced attackersRequired5Years
Ability to leverage multiple forms of communication to articulate complex concepts to technical and non-technical staff, including senior managementRequired5Years
SANS TrainingDesired
EnCase Certified Examiner (EnCE)Desired
Offensive Security Certified Professional (OSCP)Desired
CISSPDesired
• 5 years of experience in Security Operations and Incident Response.Required5Years
Job Description:
•Member of the Michigan Security Operations Center (MiSOC) and will focus on Incident Response.
•Identify security issues and risks associated with security events and manage the incident response process.
•Participate in the incident response and investigation process for identified security events.
•Use the Security Incident Event Management (SIEM) platform (IBM’s QRadar) to perform Incident Response identification and response.
•Perform network and system forensics in response to security incidents.
•Optimize and customize security-monitoring tools to improve detection.
•Hunt for signs of APT activities.
•Maintain and update the security operational workflow.
