Kaygen
Information Technology Security Specialist
Kaygen, Los Angeles, California, United States, 90079
Job Title: IT Security SpecialistLocation:- Los Angeles, CAEmployment Type:
ContractJob Description:Ability to technically interpret security events from: firewalls, endpoint protection, intrusion prevention/detection systems, security information and events management (SIEM), proxies, advanced persistent threats, email systems, servers (physical and virtual), databases and packetsAbility to interpret common attacks and exploits including but not limited to: Denial of Service, Domain Name Systems, malware infections, exploit kits, drive-by compromises, spear phishing, and/or zero daysAbility to analyze and reverse engineer malware packages to assess threats and indicators of compromiseAbility to create, correlate and modify advanced SIEM use-cases to trigger notifications on all severity levels of incidentsAbility to develop, analyze and interpret programming of malicious codesAbility to demonstrate mastery of Tier 1 and Tier 2 Security Operations Center (SOC) Analyst responsibilitiesAbility to reliably monitor and analyze specified data sources and incidentsMust have technical experience and knowledge on network and systems administrationAbility to consistently follow incident monitoring processes and proceduresAbility to document and communicate incident status updates, for non-technical personnelAbility to create consistent and complete incident reportsResponsible for monitoring escalated event alertsAbility to work well under pressure and be able to think outside of the boxRequirements:Minimum 2 (two) years of incident handling, security architecture, malware analysis, or similar experience is preferredCandidate is preferred to have at least one of the following certifications (should be current): Security+, GSEC, GCIA, GCIH, CISSP or equivalent but is not requiredo College graduate with a computer science, computer engineering, forensic degree may be considered.Valid security clearance is preferred but not required
ContractJob Description:Ability to technically interpret security events from: firewalls, endpoint protection, intrusion prevention/detection systems, security information and events management (SIEM), proxies, advanced persistent threats, email systems, servers (physical and virtual), databases and packetsAbility to interpret common attacks and exploits including but not limited to: Denial of Service, Domain Name Systems, malware infections, exploit kits, drive-by compromises, spear phishing, and/or zero daysAbility to analyze and reverse engineer malware packages to assess threats and indicators of compromiseAbility to create, correlate and modify advanced SIEM use-cases to trigger notifications on all severity levels of incidentsAbility to develop, analyze and interpret programming of malicious codesAbility to demonstrate mastery of Tier 1 and Tier 2 Security Operations Center (SOC) Analyst responsibilitiesAbility to reliably monitor and analyze specified data sources and incidentsMust have technical experience and knowledge on network and systems administrationAbility to consistently follow incident monitoring processes and proceduresAbility to document and communicate incident status updates, for non-technical personnelAbility to create consistent and complete incident reportsResponsible for monitoring escalated event alertsAbility to work well under pressure and be able to think outside of the boxRequirements:Minimum 2 (two) years of incident handling, security architecture, malware analysis, or similar experience is preferredCandidate is preferred to have at least one of the following certifications (should be current): Security+, GSEC, GCIA, GCIH, CISSP or equivalent but is not requiredo College graduate with a computer science, computer engineering, forensic degree may be considered.Valid security clearance is preferred but not required