Cyber Security Analyst

at  Martin Brower

HHH, England, United Kingdom -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate30 Nov, 2024GBP 35500 Annual04 Sep, 2024N/AActive Directory,Training,Servers,High Pressure Environment,Windows,Meeting Facilitation,Operating Systems,Regulatory Standards,Incident Response,Macos,Network Communications,Event Monitoring,Critical Thinking,Firewalls,Communication Skills,SiemNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

POSITION SUMMARY:

The Analyst for Cyber Security role will leverage advanced skills to counter the activities of cyber criminals such as hackers and developers of malicious software. It is widely accepted that the threats in cyber space growing faster than our ability to mitigate them. This position will focus on identifying internal and external cyber threats along with the appropriate defences and compensating controls.

REQUIRED SKILLS AND EXPERIENCE:

  • Bachelor’s Degree in Engineering, CS, or other IT related field
  • 2+ years of experience working in a proactive hunting and analysis role Knowledge of security event monitoring, analysis, and triage.
  • Understanding of security principles such as attack frameworks, threat landscapes, attacker TTPs, etc.
  • Knowledge of network communications, routing protocols, regulatory standards and compliance requirements and common internet applications/standards
  • Must possess a willingness to learn, a positive attitude, ambition, high energy, and self-motivation.
  • Strong collaboration skills - able to work in a team-oriented collaborative environment. Excellent verbal and written communication skills to interface with managers, staff, customers, and vendors at all levels within the company.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Strong problem-solving skills - applied skills in critical thinking and analysis, (communications) meeting facilitation, and (collaboration) interpersonal interactions.
  • Strong skills for process and design documentation
  • Hands-on knowledge of PCs, servers, firewalls, TCP/IP & protocols, network admin tools, intrusion detection systems, anti-virus software, Active Directory, data encryption, and other industry-standard techniques and practices.
  • Working technical knowledge of current systems software, protocols, procedures, and standards.
  • Travel - Occasional, based, system requirements, training, etc.
  • This position must pass a post-offer background and drug test.

Preferred Skills and Experience:

  • Technical understanding and disk and/or memory forensics capabilities on Windows MacOS, and Linux operating systems.
  • Technical understanding and forensics capability utilizing network data and PCAPs.
  • Technical understanding capability about OT space
  • Working knowledge of the incident response and cyber threat intelligence life cycles.
  • Hands on experience with EDR solutions
  • Hands on experience with log analysis, SIEM
  • Hands on experience with detection engineering
  • Hands on experience with malware analysis
  • Hands on experience with Firewall analysis
  • Hands on experience with network analysis

Responsibilities:

POSITION RESPONSIBILITIES MAY INCLUDE, BUT NOT LIMITED TO:

  • Conduct cyber security threat analysis.
  • Correlate alerts and events from diverse sources.
  • Follow playbooks and runbooks to respond and escalate incidents to the Incident Response team when needed.
  • Provide feedback to improve playbooks and runbooks after investigations.
  • Use various platforms and other proprietary tools to identify the scope and severity of each Security Incident escalated from SOC Tier 1.
  • Collaborate with SOC leadership to suggest updates for the incident response plan and procedures as well as SOC playbooks.
  • Propose new rules and tuning opportunities for the existing rules based on findings after investigations in order to increase efficiency and reduce false positives.
  • Follow industry best practices for SOC cyber security operations such as MITRE ATT&CK and NIST Cybersecurity Framework (CSF).
  • Evaluate, report, and make recommendations on the effectiveness of the organization’s cyber security controls. Assess need for any security reconfigurations (minor or significant) within enterprise technologies such as: network(s), Active Directory, Database Platforms, general security processes, etc., and build consensus for remediation adoption and finally facilitating execution.
  • Work with RH Security and IT teams to improve and expand the value that we are delivering.
  • Any other duties as assigned
    Qualifications:


REQUIREMENT SUMMARY

Min:N/AMax:5.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Other

Graduate

Engineering cs or other it related field

Proficient

1

Hemel Hempstead HP2, United Kingdom