Whateverittakescom
CSIRC Tier 3-4 Analyst
Whateverittakescom, Washington, District of Columbia, us, 20022
Computer Security Incident Response Center (CSIRC) Tier 3/4 Analyst
Tracking Code
017-142
Job Description
WITCOM has an immediate, funded opportunity for a Tier 3/4 Analyst to join our mission critical customer in Washington, DC. Qualified candidates must possess a minimum Top Secret clearance or be able to obtain a Public Trust Level 6c.
The overall objective of this position is to function in an Analyst capacity and provide Tier 3/4 analysis of security tool event feeds, network traffic and log analysis, prioritization and differentiation between potential intrusion attempts, determination of false alarms, insider threat and advanced persistent threat (APT) detection, and malware analysis/forensics, and create and track investigations to resolution according to established industry best practices. The ideal candidate should be able to multitask and give equal attention to a variety of functions while under pressure. The individual must have very good communication skills, including the ability to write and verbally articulate industry terminology to successfully brief management. The candidate will be required to stay up-to-date with current vulnerability methodologies, attack vectors and countermeasures, along with staying current in all security related news and developments.
Monitor and analyze network traffic, intrusion detection systems (IDS), security events and audit logs
Prioritize and differentiate between potential intrusion attempts and false alarms
Create and track security investigations to resolution
Compose security alert notifications and other communications as required
Advise incident responders in the steps required to investigate and resolve computer security incidents
Stay and remain up-to-date with current vulnerability methodologies, attack vectors and countermeasures
Provide comprehensive threat analysis reporting from multiple tools based on provided indicators
Desired Skills
Familiarity with various network and host-based security applications and tools such as network and host assessment/scanning tools, network and host base intrusion detection systems, and other security software packages
Previous experience providing training and meeting expected performance service level agreements (SLAs)
Prior computer forensics experience strongly encouraged
Must possess excellent written communication skills and the proven ability to understand and present complex, technical information to both technical and non-technical audiences
Must be able to work independently and/or as part of a team
Required Experience
Bachelor’s Degree in Computer Science, Engineering, or related field preferred, along with 5-8 years of directly related experience, or Masters Degree, or equivalent experience within related field
Previous experience on a Computer Incident Response Team (CIRT)/Computer Emergency Response Team (CERT), or Computer Security Incident Response Center (CSIRC), or a Cyber Security Operations Center (SOC) environment
Experience with anti-virus, intrusion detection systems, firewalls, Active Directory, vulnerability assessment tools and other security tools found in large networks environments, along with experience working with Security Information and Event Management (SIEM) solutions
Solid working experience with security monitoring tools such as Splunk, RSA Netwitness (security analytics), Tanium, ForeScout or similar tools
Industry Certification such as Certified Incident Handler (GCIH), Cyber Security Essentials Certification (GSEC), Security +, Certified Ethical Hacker (CEH), or Certified Information Systems Security Professional (CISSP)
COPYRIGHT WITCOM 2016. ALL RIGHTS RESERVED.
#J-18808-Ljbffr
#J-18808-Ljbffr