Job ID: BL-10696-1 (98590119)

Hybrid Security Analyst (Security+/CySa+/Pen+/CASP+/CEH/SSCP/CCSP/CISSP) with SIEM, EDR IPS/IDS, Incident Response, SQL, C/C++, Red/Blue Team, Python, PowerShell, Office 365, SOC, Log Analyst experience

Location: COLUMBIA, SC
Duration: 12+ Months Hrs/Wk:40.00
Remote Work Availability:25%

REQUIRED SKILLS:
• SIEM, EDR IPS/IDS Experience
• Incident Response Experience
• Security Documentation
• SQL
• C/C++
• Red Team experience
• Blue Team experience
• Python
• Powershell
• Office 365 Security Administration

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• Preference will be given to
experienced Security Operation
Center (SOC) security analyst.
• SIEM/Log Analyst experience.
• SQL/Scripting (reports and
automation) experience.

PREFERRED EDUCATION/CERTIFICATIONS:
• Security+
• CySa+
• Pen+
• CASP+
• CEH
• SSCP
• CCSP
• CISSP.

skills :
Database PlatformsMS SQLYes1AdvancedCurrently Using4 – 6 Years
Network SecuritySecurity Information Event Management (SIEM) systems development / configurationYes1AdvancedCurrently Using4 – 6 Years
Operating Systems/APIsPowerShellYes1AdvancedCurrently Using4 – 6 Years
Programming LanguagesC/C++Yes1AdvancedCurrently Using4 – 6 Years
Programming LanguagesPythonYes1AdvancedCurrently Using4 – 6 Years

Security Engineer – Project Lead
SCOPE OF WORK:
The Office of the CISO is responsible for securing and monitoring the agency’s critical applications and network for the Department of Social Services.
The Department seeks a highly motivated individual who has the skills and experience needed to support this Office’s mission in protecting the Agency’s digital environment.

DAILY DUTIES / RESPONSIBILITIES:
Candidate should be an expert security administration and security continuous
monitoring. In addition, they should be an expert in performing log analysis, risk
analysis, incident response processes, and investigation procedures. This includes
experience working in a security operations center and working with security tools
including SIEM, EDR,

Job Duties
• Planning, implementing, upgrading, and monitoring security measures for the protection
of computer network security and information – both LAN and cloud based.
• Develop and implement security policies, procedures, and standards to protect the
organization’s data and assets
• Monitoring and reporting on SIEM and EDR event data.
• Maintaining records of security events investigated and incident response activities.
• Serve as a Tier III security support on the agency’s security team.
• Conduct security assessments of systems, networks, and applications to identify
vulnerabilities and risks.
• Work with and provide mentorship to other information security team members on
security strategies, processes, response, and technologies.
• Respond to security incidents and breaches, and work to mitigate the impact and prevent
future incidents.
• Provides incident response support, threat assessment, and computer forensic
investigations.
• Coordinate and assist with other Information Technology functions/teams to accomplish
agency security objectives.
• Creating risk analysis documents when reviewing system functional specifications
including use cases, activity, sequence, data flow, collaboration, and diagrams.
• Create security report using complex SQL queries, API integrations, and Power BI.
Knowledge of blue team tools such as SCAP workbench, vulnerability scanning, and
hardening techniques.
• Knowledge of red team tools such as nmap, wireshark, Metasploit, and password
crackers.

Hybrid Security Analyst (Security+/CySa+/Pen+/CASP+/CEH/SSCP/CCSP/CISSP) with SIEM, EDR IPS/IDS, Incident Response, SQL, C/C++, Red/Blue Team, Python, PowerShell, Office 365, SOC, Log Analyst experience

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from innoSoul

Subscribe now to keep reading and get access to the full archive.

Continue reading