Cyber Security Analyst
at Martin Brower
HHH, England, United Kingdom -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 30 Nov, 2024 | GBP 35500 Annual | 02 Sep, 2024 | N/A | Active Directory,Training,Servers,High Pressure Environment,Windows,Meeting Facilitation,Operating Systems,Regulatory Standards,Incident Response,Macos,Network Communications,Event Monitoring,Critical Thinking,Firewalls,Communication Skills,Siem | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
POSITION SUMMARY:
The Analyst for Cyber Security role will leverage advanced skills to counter the activities of cyber criminals such as hackers and developers of malicious software. It is widely accepted that the threats in cyber space growing faster than our ability to mitigate them. This position will focus on identifying internal and external cyber threats along with the appropriate defences and compensating controls.
REQUIRED SKILLS AND EXPERIENCE:
- Bachelor’s Degree in Engineering, CS, or other IT related field
- 2+ years of experience working in a proactive hunting and analysis role Knowledge of security event monitoring, analysis, and triage.
- Understanding of security principles such as attack frameworks, threat landscapes, attacker TTPs, etc.
- Knowledge of network communications, routing protocols, regulatory standards and compliance requirements and common internet applications/standards
- Must possess a willingness to learn, a positive attitude, ambition, high energy, and self-motivation.
- Strong collaboration skills - able to work in a team-oriented collaborative environment. Excellent verbal and written communication skills to interface with managers, staff, customers, and vendors at all levels within the company.
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Strong problem-solving skills - applied skills in critical thinking and analysis, (communications) meeting facilitation, and (collaboration) interpersonal interactions.
- Strong skills for process and design documentation
- Hands-on knowledge of PCs, servers, firewalls, TCP/IP & protocols, network admin tools, intrusion detection systems, anti-virus software, Active Directory, data encryption, and other industry-standard techniques and practices.
- Working technical knowledge of current systems software, protocols, procedures, and standards.
- Travel - Occasional, based, system requirements, training, etc.
- This position must pass a post-offer background and drug test.
Preferred Skills and Experience:
- Technical understanding and disk and/or memory forensics capabilities on Windows MacOS, and Linux operating systems.
- Technical understanding and forensics capability utilizing network data and PCAPs.
- Technical understanding capability about OT space
- Working knowledge of the incident response and cyber threat intelligence life cycles.
- Hands on experience with EDR solutions
- Hands on experience with log analysis, SIEM
- Hands on experience with detection engineering
- Hands on experience with malware analysis
- Hands on experience with Firewall analysis
- Hands on experience with network analysis
Responsibilities:
POSITION RESPONSIBILITIES MAY INCLUDE, BUT NOT LIMITED TO:
- Conduct cyber security threat analysis.
- Correlate alerts and events from diverse sources.
- Follow playbooks and runbooks to respond and escalate incidents to the Incident Response team when needed.
- Provide feedback to improve playbooks and runbooks after investigations.
- Use various platforms and other proprietary tools to identify the scope and severity of each Security Incident escalated from SOC Tier 1.
- Collaborate with SOC leadership to suggest updates for the incident response plan and procedures as well as SOC playbooks.
- Propose new rules and tuning opportunities for the existing rules based on findings after investigations in order to increase efficiency and reduce false positives.
- Follow industry best practices for SOC cyber security operations such as MITRE ATT&CK and NIST Cybersecurity Framework (CSF).
- Evaluate, report, and make recommendations on the effectiveness of the organization’s cyber security controls. Assess need for any security reconfigurations (minor or significant) within enterprise technologies such as: network(s), Active Directory, Database Platforms, general security processes, etc., and build consensus for remediation adoption and finally facilitating execution.
- Work with RH Security and IT teams to improve and expand the value that we are delivering.
- Any other duties as assigned
Qualifications:
REQUIREMENT SUMMARY
Min:N/AMax:5.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Other
Graduate
Engineering cs or other it related field
Proficient
1
Hemel Hempstead HP2, United Kingdom