Logo
Global Technical Talent

Cyber Security Threat Analyst/Specialist - (AWS)

Global Technical Talent, Concord, California, us, 94527


*LOCAL CANDIDATES ONLY* 3 days onsite and 2 days wfh

TOP THINGS:- teamwork, curiosity, tenacity

WORK SCHEDULE: Sunday to Thursday (Swing shift) 2 PM to 8 PM.

*Client laptop will be provided

Department OverviewResponsible for the delivery of information security services including intelligence research, threat assessment, security event monitoring/analysis, vulnerability management and security tool administration in support of PG&E's enterprise security goals and objectives. Cyber Threat Specialists use a variety of commercial and custom tools and processes to provide the information security services mentioned above. Cyber Threat Specialists are experts in the operation of these tools and have the ability to design improvised solutions on the fly when dealing with active threats. Cyber Threat Specialists produce metrics and statistics that feed complimentary processes in PG&E such as risk assessment, patching, anti-virus, firewall management, etc. Cyber Threat Specialists are very technically skilled and have the ability to work successfully with other technical teams within PG&E's IT department and beyond.

Position SummaryThe Monitoring & Response Team (also known as M&R) is the 24x7 security operations team that is essentially PG&E's first line of defense that is continuously preventing, detecting, analyzing, and responding to cybersecurity events to improve the organization's security posture. The Monitoring & Response Team is built with the foundation of a standard SOC but operates differently by utilizing Threat Intelligence in our daily investigations of security events. The Monitoring & Response Team also operates in a proactive/reactive manner to maintain the highest level of efficacy in their tasks.

Job Responsibilities•Monitors daily cybersecurity activity in shifts through looking at tools to determine if activity is malignant or benign and then engage others as required•Provides analysis on malware and escalates as appropriate to incident response Teams•Does baseline threat hunting based on intelligence for utility peers and other intelligence sources•Provides hunting/analysis on phishing cases and reports of potential compromise/breach•Performs proficient forensic analysis using security tools and monitoring systems to Client the source of anomalous security events•Assists in performing basic research internally and externally•Performs complex system administration tasks (e.g. customization, cross-tool integration) for security tools•Develops a strategy to implement work in department

QualificationsMinimum:•High School or GED-General Educational Development-GED Diploma

Desired:•Bachelors Degree in Computer Science or job-related discipline or equivalent experience•IT-Information Technology Security certification

Benefits:Medical, Vision, and Dental Insurance Plans401k Retirement Fund