AustinRecruiter Since 2001
the smart solution for Austin jobs

Security Analyst

Company: Apex Systems
Location: Austin
Posted on: August 2, 2020

Job Description:

To apply email a Word resume to Tatiana at tclarosapexsystems.com Thank you! Title Sr. Security Analyst Location Austin, TX Long Term Contract W2 Pay Rate 60-70HR Negotiable and Dependent on Experience Selected candidates must be s, pass a CJIS background check process, and complete basic safety and security training to meet the customer requirements The preferred candidate will have a total of 10 years' experience in the Information Technology Information Security industry, with minimum of 5 years of experience as a Security Analyst utilizing SIEM technologies. Candidate should have strong communications skills, both written and verbal, be comfortable presenting information to teammates, customer technical personnel and LeadsManagers. This is an analyst role and candidate must be able to demonstrate ability to perform and support in-depth investigations and 'hunting' activities. Demonstrated experience in using the Splunk Enterprise Security SIEM technologies as an analyst is REQUIRED. Holding the Splunk Power User Certification is PREFERRED. Holding Certified Ethic Hacker (CEH) andor Certified Incident Handler (GCIH or ECIH) credentials is a plus for this position. This position is based in AUSTIN, TX, and will support the customer's 24x7 Security Operations Center (SOC). This position is in direct support (on-site at customer facilities) of a customer in the government sector. The candidate providing Managed Security Service Provider (MSSP) functions related to the Security Operations Center (SOC) including Tier 1 through Tier 3 resource capabilities and activities related to security monitoring, threat, and vulnerability management and incident response (IR). Preference will be made for candidates who can support 'non-business hours' shifts. Responsibilities Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. Perform cyber defense trend analysis and reporting. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. Provide daily summary reports of network events and activity relevant to cyber defense practices. Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. Provide timely detection, identification, and alerting of possible attacksintrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity. Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. Determine tactics, techniques, and procedures (TTPs) for intrusion sets. Recommend computing environment vulnerability corrections. Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). Create and document procedures and work instructions for use by the SOC staff (Tier 1 through Tier 3). Train and mentor the Tier 1 and Tier 2 analysts as needed. Validate eventsalerts received from all monitored security systems against network traffic using packet analysis tools. Reconstruct a malicious attack or activity based off network traffic. Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave. Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise. Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. Qualifying Experience and Attributes Holding the Splunk Power User Certification is PREFERRED. Ability to create and maintain custom reports, dashboards and views utilizing the SIEM Ability to manage (add, modify and delete) data feeds between monitored devices and the SIEM Ability to create and maintain custom parsers used by the SIEM Ability to create 'use cases' to customize the alerting of the SIEM to meet customer needs Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies. Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute). Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of cybersecurity and privacy principles. Knowledge of cyber threats and vulnerabilities. Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts. Knowledge of hostnetwork access control mechanisms (e.g., access control list, capabilities lists). Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). Knowledge of incident response and handling methodologies. Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). Knowledge of network traffic analysis methods. Knowledge of new and emerging information technology (IT) and cybersecurity technologies. Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP, Open System Interconnection Model OSI, Information Technology Infrastructure Library, current version ITIL). Knowledge of key concepts in security management (e.g., Release Management, Patch Management). Knowledge of security system design tools, methods, and techniques. Knowledge of Virtual Private Network (VPN) security. Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities. Knowledge of Insider Threat investigations, reporting, investigative tools and lawsregulations. Knowledge of adversarial tactics, techniques, and procedures. Knowledge of network tools (e.g., ping, traceroute, nslookup) Knowledge of defense-in-depth principles and network security architecture. Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip). Knowledge of interpreted and compiled computer languages. Knowledge of cyber defense and information security policies, procedures, and regulations. Knowledge of the common attack vectors on the network layer. Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). Knowledge of cyber attackers (e.g., script kiddies, insider threat, nationnon-nation state sponsored). Knowledge of system administration, network, and operating system hardening techniques. Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. Signature implementation impact for viruses, malware, and attacks. Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). Knowledge of Intrusion Detection System (IDS)Intrusion Prevention System (IPS) tools and applications. Knowledge of network protocols such as TCPIP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Knowledge of how to use network analysis tools to identify vulnerabilities. Knowledge of penetration testing principles, tools, and techniques. Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). Skill in using protocol analyzers. Skill in collecting data from a variety of cyber defense resources. Skill in recognizing and categorizing types of vulnerabilities and associated attacks. Skill in reading and interpreting signatures (e.g., snort). Skill in performing packet-level analysis. EEO Employer Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at employeeservicesapexsystemsinc.com or 844-463-6178.SDL2017

Keywords: Apex Systems, Austin , Security Analyst, Professions , Austin, Texas

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category
within


Other Professions Jobs


Owner Operator OTR Driver
Description: br br Call Us At 866 990-5053 to learn more br Hiring Owner Operators Flatbed OTR Truck Drivers Earn 82 of the Revenue Earn Weekly Gross 5000 br Join Paul Transportation Flatbed division (more...)
Company: Paul Transportation
Location: Austin
Posted on: 08/14/2020

CDL-A Company Driver - Regional Dry Van - Graduated Training
Description: CDL-A Company Driver - Regional Dry Van - Graduated Training. Description:
Company: deBoer Transportation Inc.
Location: Cedar Creek
Posted on: 08/14/2020

Owner Operator OTR Driver
Description: br br Call Us At 866 990-5053 to learn more br Hiring Owner Operators Flatbed OTR Truck Drivers Earn 82 of the Revenue Earn Weekly Gross 5000 br Join Paul Transportation Flatbed division (more...)
Company: Paul Transportation
Location: Manor
Posted on: 08/14/2020


Business Analyst (Long-Term Care Architectural Review Unit)
Description: Please apply for this position by sending your resume to Email apply AT chandratech DOT com SUBJECT Applying for Business Analyst Long-Term Care Architectural Review Unit Austin, TX Hourly Rate 78 W2 (more...)
Company: Chandra Technologies, Inc.
Location: Austin
Posted on: 08/14/2020

Full Time Warehouse Associate - Repack/Picker (10:00am Shift) - $13/hr Starting Pay
Description: br br Company Overview Entry level Warehouse Associate needed to pick customer orders. Where: 4401 Freidrich Ln, Austin, TX 78744 Type: Full Time, Permanent Wage: 13/hr and up based on experience (more...)
Company: HD Supply
Location: Austin
Posted on: 08/14/2020

OTR & Regional Flatbed Drivers
Description: br br Paul Transportation is now hiring Company OTR and Regional Flatbed drivers at NEW TOP PAY. br Earn .46 CPM with 9 months experience br Call Us At 866 990-5053 to learn more br Join (more...)
Company: Paul Transportation
Location: Manor
Posted on: 08/14/2020

Regional Flatbed Drivers - Home EVERY Weekend
Description: br br Regional Flatbed Drivers Home Every Weekend br Call Us At 866 990-5053 to learn more br Oklahoma Regional Fleet MUST LIVE IN OKLAHOMA, TEXAS, KANSAS OR MISSOURI. br Paul Transportation (more...)
Company: Paul Transportation
Location: Buda
Posted on: 08/14/2020

Truck Driver CDL A
Description: Dart Transit Company br Even a global pandemic can't stop us. At Dart, we have the consistent miles you need to get paid while delivering essential freight. You keep America moving while building a (more...)
Company: Dart Transit Company
Location: Mc Queeney
Posted on: 08/14/2020

Regional Flatbed Drivers - Home EVERY Weekend
Description: br br Regional Flatbed Drivers Home Every Weekend br Call Us At 866 990-5053 to learn more br Oklahoma Regional Fleet MUST LIVE IN OKLAHOMA, TEXAS, KANSAS OR MISSOURI. br Paul Transportation (more...)
Company: Paul Transportation
Location: Manor
Posted on: 08/14/2020

Truck Driver CDL A
Description: Dart Transit Company br Even a global pandemic can't stop us. At Dart, we have the consistent miles you need to get paid while delivering essential freight. You keep America moving while building a (more...)
Company: Dart Transit Company
Location: Waelder
Posted on: 08/14/2020

Log In or Create An Account

Get the latest Texas jobs by following @recnetTX on Twitter!

Austin RSS job feeds