Job ID: BL-11477-1 (913291213)

Hybrid/Local Security Analyst/Architect vulnerability assessment, networking, PCI/NIST, IRS SCSEM, OWASP Top 10, Penetration Testing, SIEM, Tenable Security Center admin, wireshark, SOC, Windows Security experience

Location: Columbia, SC
Duration: 12 Months
Remote Work Availability: 75%

Skills:
Network Security Ability to install and use various security tools Yes 3 Advanced Currently Using 6 + Years
Network Security Cybersecurity Yes 1 Expert Currently Using 6 + Years
Network Security information security principles and practices Yes 2 Expert Currently Using 6 + Years
Network Security IT Security Yes 1 Expert Currently Using 6 + Years
Network Security risk/vulnerability assessments Yes 2 Advanced Currently Using 2 – 4 Years
Network Security Security – Knowledge in networking, databases, systems and Web operations Yes 4 Expert Currently Using 6 + Years
Network Security Experience in projects involving PCI/NIST security implementations and/or audits. No 5 Advanced Currently Using 2 – 4 Years
Network Security IRS Safeguard Computer Security Evaluation Matrix (SCSEM) No 1 Intermediate Within 2 Years 1 – 2 Years
Network Security OWASP Top 10 remediation techniques No 9 Advanced Within 5 Years 2 – 4 Years
Network Security Penetration Testing No 6 Advanced Within 5 Years 2 – 4 Years
Network Security Security Information Architecture No 3 Advanced Currently Using 4 – 6 Years
Network Security Security Information Event Management (SIEM) systems development / configuration No 1 Lead Within 5 Years 4 – 6 Years
Network Security Tenable Security Center Administration No 7 Intermediate Within 5 Years 1 – 2 Years
Network Security Windows Security – Group Policy No 5 Advanced Currently Using 4 – 6 Years
Network Security wireshark No 5 Intermediate Within 1 Year 2 – 4 Years

Additional Skills:
SOC 2 or SOC 3 experience required. Threat hunting, creation and tuning of offenses, alerts, log sources. Incident management all required. Prefer forensics and cloud experience.

Job Description:
SCOPE OF THE PROJECT:
This specific Statement of Work is for a Cyber SOC Experienced Analyst to prevent, detect, investigate, and assist in directing remediation to cyber-attacks and threats against organization enterprise applications, networks, and services by investigating indicators of suspicious and malicious activity, and proactively discovering threats to organization. Individual must have at least 7 years’ experience in Security with a MINIMUM of 5 years hands on working with a SIEM creating offenses, alerts and grooming logs. Preference is an individual who has experience leading a CSIRT, CERT, SOC or Investigations team. SIEM preference is QRadar and Azure Sentinel.

This position requires previous security operational center experience – monitoring, investigating, alerting, and reporting security threats. It also requires previous experience in developing SOPs and documentation.

Candidate will be required to explain previous experience in the following:
– Developing offenses and alerts in SIEM and Incident Response tools
– Oversight and development of Use Cases, Playbooks/Runbooks, SOP.
– Impact of their work on improving the security of an organization.
– Network vulnerability and compliance scanning
– Review and interpretation of the results thereof
– Determination of severity and urgency when evaluating risk
– Working with system owners to determine if and when corrective action will be taken.

You will have a technical role, supporting the SOC Analysts to find the threat actors attempting to attack SCDOR infrastructure. You will need to be a technical and professional leader, someone who enjoys training and mentoring teammates, and a person who can encourage and elevate the team.

Under general supervision, the contractor will serve as an analyst reporting directly to a functional manager. Contractor will be a team member that ensures the stability and integrity of data, and server services through monitoring, maintenance, support, and optimization of all agency infrastructure. This individual has 24/7 on-call responsibilities shared with the group. This position can be remote, but we require contractor to report on-site for one week each quarter at vendor’s expense.

DAILY DUTIES / RESPONSIBILITIES:
The Cyber SOC Experienced Analyst will ensure the effective operations of the SOC through the following:

Technical
– Proactively search for active intrusions in the SCDOR environment, recognizing potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
– Work closely with escalation points to close out complex investigation
– Conducting holistic, investigative analysis and rating the risk associated with observed activity
– Review investigation escalations from SOC Analysts to ensure accurate analysis and provide advice/mentorship
– Refine and develop dashboards, queries and reports to continuously improve security situational awareness
– Maintain SOC documentation, procedures, processes and hardware and software inventory detail
– Demonstrate a sound understanding of security technologies and their function within a networked environment
– Adhere to corporate information security guidelines and promote information security among coworkers
– Develop reports (manual and automated) to support the development, collection, and reporting of Quality Assurance and Performance metrics.
– Performs other duties and special projects as assigned.

Non-Technical
– Demonstrate highly technical thinking and knowledge, inspire confidence and credibility within a team
– Time management on multiple investigations, prioritizing
– Appetite to develop an understanding of most investigations, cyber threats and computer forensics.
– Taking control of high-pressure situations and the attention to detail to precisely find the source
– A good team ethos, drive and be a self-starter.
– The ability to work unsupervised and under pressure
– Excellent verbal and written communication skills
– Provide feedback to team regarding product issues, enhancements and new features.
– Ability to ask pertinent questions of others.
– Proactively seek to identify, communicate and implement process related improvements.
– Effectively manage multiple tasks and activities concurrently and able to provide periodic status updates to key stakeholders
– Collaborate extensively with peers and management to resolve client issues while actively contributing to a growing knowledge network that improves the effectiveness of our team and the information available to our clients.
– Prioritize numerous issues of varying severity, and effectively manage the resolution of all issues within accepted service levels. This includes ownership of the data entered into the Helpdesk system and appropriately updating both client and appropriate employees of status of all issues on a timely basis.
– Good customer skills, be attentive to detail, and responsive to customer tickets
– Performs other duties and special projects as assigned.

REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• CURRENTLY EMPLOYED AS A SOC 2 or SOC 3 ANALYST
• CURRENTLY USING SOAR AND SIEM TECHNOLOGY
• RISK AND VULNERABILITY ASSESSMENTS
• INCIDENT MANAGEMENT
• SECURITY INFORMATION EVENT MANAGEMENT (SIEM) TUNING OF OFFENSES, ALERTS
• EXCELLENT WRITTEN AND VERBAL COMMUNICATIONS SKILLS
• THREAT HUNTING
• ABILITY TO USE INDUSTRY LEADING SECURITY TOOLS
• DEMONSTRATE KNOWLEDGE OF INFORMATION SECURITY PRINCIPLES AND PRACTICES
• KNOWLEDGE OF COMMON RISKS AND THREATS FOR NETWORKING, DATABASES, SYSTEMS, CLOUD AND WEB OPERATIONS

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• IRS Safeguard Computer Security Evaluation Matrix (SCSEM)
• Forensics
• Experience in projects involving PCI/NIST security implementations and/or audits.
• Windows Security, including Cloud
• Wireshark
• SIEM tuning of log sources
• SIEM systems development/configuration
• Penetration Testing
• Tenable Security Center Administration
• OWASP Top 10 remediation techniques

REQUIRED EDUCATION/CERTIFICATIONS:
• Seven (7) years of experience in security information technology systems or related area, with a minimum of 5 years utilizing SIEM or SOAR technology.

PREFERRED EDUCATION/CERTIFICATIONS:
.Preferred Industry Certifications in field.
• Cloud Certifications
• Microsoft Certifications, Azure, Security related
• GCIH, GCTI, GCCC, GCWN, GSEC, CEH, GCIA, GCFA, GCFE, GREM, CCIM, CFCE, CCE, CIFI, CHFI, CCNA, CCNA Cyber Ops
• IBM Certified Associate Analyst – Security QRadar SIEM

Professional Reference Check Form.docx

SC RTR.docx

Hybrid/Local Security Analyst/Architect vulnerability assessment, networking, PCI/NIST, IRS SCSEM, OWASP Top 10, Penetration Testing, SIEM, Tenable Security Center admin, wireshark, SOC, Windows Security experience

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from innoSoul

Subscribe now to keep reading and get access to the full archive.

Continue reading