Cyber Security Analyst
AMS Staffing, Inc. Bethlehem, PA
- Expired: over a month ago. Applications are no longer accepted.
Please send resume if you are interested in this Cyber Security Analyst opportunity - it is 100% remote (EST). The Cyber Security Analyst is responsible for day-to-day oversight and escalation point for the Security Operations Center (SOC). This is a full-time position with a salary of $80K - $100K + Excellent Benefits.
We currently have an exciting opportunity for a Cybersecurity Analyst at our Bethlehem, PA location. The Cyber Security Analyst will report to the Cyber Security Manager. This role is highly technical as the day-to-day oversight and escalation point for the Security Operations Center (SOC) [currently outsourced] it requires a holistic depth of knowledge across the security technology tools stack as well as hands-on keyboard experience and ability to work collaboratively across the organization. You will need to represent the SOC in front of application owners, executives, and other key stakeholders across the organization to communicate both security gaps as well as operational improvements. You will work to develop, maintain, and report on procedures to detect and respond to information security incidents as well as leading complex security investigations. The Analyst will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint. Since the SOC has been fully outsourced, the Analyst will be the recipient of alerts so they can be investigated, qualified, triaged, and resolved in a timely manner. The Incident Response Lead should have expert familiarity with the principles of network and endpoint security, current threat and attack trends, an expert understanding of the OSI model, and have extensive experience in the application of defense in depth strategies.
Education: Bachelors Degree in computer science, computer engineering, or information systems with emphasis on IT/Information/Cyber-security preferred.
Experience: Minimum of 5 years of experience in information services with demonstrable and progressive experience operating incident response and handling domains.
Require in-depth understanding of Information Security practices for network, servers, databases, applications, and advanced use of incident response and handling techniques.
Skills and attributes for success include the following:
Proven experience with multiple security event detection platforms.
Expert understanding of IDS/IPS rules to identify and/or prevent malicious activity.
Excellent written and verbal communication skills required. Must be able to communicate technical details clearly.
Minimum of 5 years of experience in one or more of the following:
Working in a Security Monitoring/Security Operations Center environment (SOC).
Experience investigating security events, threats and/or vulnerabilities.
Experience leading and directing security incident response.
Desired skill: Previous leadership experience as a team lead or supervisor
Experience working with SIEM [QRadar], Antivirus [McAfee], Endpoint Detection and Response (EDR) [McAfee, Carbon Black, and Crowdstrike], Log Aggregators, Incident Response Management solutions Experience managing standards, developing Security Operations Process, reporting and dashboards
AMS Staffing, Inc.
TechnologyView all jobs at AMS Staffing, Inc.