Logo
Meneses Law

Cyber Security Administrator

Meneses Law, Houston, TX, United States


For this role, we are looking for a curious and innovative team member with a passion for cyber threat identification and remediation, information security operations, automation, customer service, and program development skills. As a Cyber Security Research and Hunting Analyst (R&H), you'll be partnering with multiple functions in Cyber Threat and Incident Response team who are responsible for ensuring that our digital estate is protected from threats.

You will be working alongside a diverse team and be a vital contributor to identifying, triaging, and managing threats and risks in the cyber environment. You will also act to ensure that Meneses Law digital estate is protected from threats both known and unknown.

You will use your cyber threat intelligence, incident response and/or digital forensics experience to assist with buildout and development of the Research and Hunt function here at Meneses Law. You will be willing to share your knowledge by integrating in to or leading specialized cross functional investigation teams and you'll provide realistic but out-of-the-box thinking for incident response and hunt development, you'll also be seen as a subject matter expert for threats faced by the group.

You will need to bring strong knowledge of adversary methodologies and toolsets, as well as operational experience across multiple domains, and operating systems to be successful in this position. An understanding of logging, correlation, and enrichment techniques are also vital for investigations thoroughness and continuity. Your knowledge of IT security principles and the ability to multitask will allow you to deliver in high pressure situations.

  • You understand the difference in, and importance of subjective and objective data and documentation
  • You understand logging, correlation, and enrichment techniques from a variety of sources
  • You have demonstrated an ability to capture and generate cyber threat intelligence which can be used by incident response teams and other relevant stakeholders
  • Create cybersecurity reporting metrics, dashboards, and scorecards.
  • Analyze firewall logs, Full Packet Capture (PCAP), IDS alerts, Anti-malware alerts, Host Intrusion Prevent System (HIPS), and server and application logs to investigate events and incidents for anomalous activity and produce reports of findings.
  • You have demonstrated an ability to prioritize, research and document threat activity
  • Detailed understanding of common cyber security analytic frameworks and models
  • You have an interest or experience working within a red or purple team environment
  • You may be able to bring a suite of DFIR skills to the team
  • You may be able to bring advanced static and dynamic analysis, and reverse engineering to the team
  • Your curiosity and drive for continuous learning and development of yourself and those around you will set you ahead of the pack
  • You'll understand the human element as much as the malware element. You'll understand methodologies, toolsets, and motives of different threat families and what they mean
  • Conduct ethics and compliance investigations in coordination with Compliance & Human Resources.
  • Perform other duties or assigned tasks based on departmental needs.
Qualifications:
  • 2 or more years of technical experience in the Information Security field
  • Experience writing, reviewing and editing cyber-related intelligence/assessment products from multiple sources
  • Experience triaging security events using a variety of tools in a security operations environment.
  • Experience with packet flow, TCP/UDP traffic, firewall technologies, IDS technologies (e.g., Snort rules), proxy technologies, and antivirus, spam, and spyware solutions.
  • Experience conducting incident response activities and seeing incidents through to successful remediation.
  • Experience with a programming/scripting language such as Python, Perl or similar.
  • Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • Deep knowledge of computer networking concepts and protocols, and network security methodologies.
  • Deep knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Strong understanding of network traffic analysis methods including packet-level analysis.
  • Deep knowledge of network security architecture concepts including topology, protocols, components, and principles.
  • Strong understanding of malware analysis concepts and methodologies.
  • Solid ability to employ incident handling methodologies.
  • Deep knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Strong process execution, time management and organizational skills.
  • Strong work ethic, leadership skills, initiative, and ownership of work.
  • Solid ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • High proficiency with common cybersecurity management frameworks, regulatory requirements, and industry leading practices.
  • At least one of the following certifications is required: CISSP, CEH and/or the following SANS certifications: GCIH, GCFE, GCFA, GREM, GPEN, GWAPT, GXPN are preferred, but not required.
Job Type: Full-time

Benefits:
  • Dental insurance
  • Health insurance
  • Paid time off
  • Vision insurance
Education:
  • Bachelor's Degree in Information Technology, Information Systems, Computer Science or a related technical field of study. Related experience may be considered in lieu of required education.
Experience:
  • Information security: 2 years (Preferred)
  • Incident response: 2 years (Preferred)
License/Certification:

Certified Information on Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Shared Assessments Certified Third Party Risk Professional (CTPRP) or Certified Third Party Risk Assessor (CTPRA), Information Systems Security Architecture Professional (ISSAP), Information Systems Security Engineering Professional (ISSEP)

To join a high performing Cyber team, apply online now or for more information visit www.meneses.law/careers

Job Type: Full-time

Pay: From $65,000.00 per year

Benefits:
  • Dental insurance
  • Health insurance
  • Life insurance
  • Paid time off
  • Vision insurance
Schedule:
  • 8 hour shift
Education:
  • Bachelor's (Required)
Experience:
  • Splunk: 1 year (Required)
  • Cybersecurity: 2 years (Required)
  • Information security: 2 years (Required)


Work Location: In person