Tier I Cybersecurity Analyst at Tangent Technologies LLC
Chandler, AZ 85226, USA -
Full Time


Start Date

Immediate

Expiry Date

04 Dec, 25

Salary

0.0

Posted On

04 Sep, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Chandler, Security Operations Center

Industry

Information Technology/IT

Description

Tangent Technologies is currently seeking a qualified candidate to fulfill a role as a Security Operations Center (SOC) Tier I Cyber Security Analyst supporting the Department of Homeland Security located in Chandler, AZ. Cyber Security Analysts are needed to staff a 24x7x365 Security Operations Center (SOC). This requirement requires US CITIZENSHIP due to Federal contractual obligations. Do not apply unless you have an Active DoD Secret Clearance and are local to Chandler. Candidates who do not meet these requirements will not be considered.

JOB QUALIFICATIONS:

  • High School Diploma
  • Must have a Security + Certification
  • Must have a CYSA+ Certification
  • Must have a Certified Ethical Hacker (CEH) Certification within 6 months of start date
  • Previous experience on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC). Experience with Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, Vulnerability Assessment tools and other security tools found in large network environments; along with experience working with Security Information and Event Management (SIEM) solutions.
  • Familiarity with various network and host-based security applications and tools, such as network and host assessment/scanning tools, network and host-based intrusion detection systems, and other security software packages.
    Job Location: Chandler, AZ
    Position Type: Full-Time/Regular
    Security Requirement: Secret
Responsibilities
  • IDS monitoring and analysis, analyze network traffic, log analysis, prioritize and differentiate between potential intrusion attempts and false alarms.
  • Create and track investigations to resolution.
  • Compose security alert notifications.
  • Advise incident responders in the steps to take to investigate and resolve computer security incidents.
Loading...