Gray Tier Technologies LLC
Cyber Threat Analyst
Gray Tier Technologies LLC, Ashburn, Virginia, United States, 22011
Primary Responsibilities:
Shift schedule: 7pm-7am, Thurs-Sat, every other Wednesday.
· Utilize state of the art technologies such as Endpoint Detection & Response tools, log analysis (Splunk) and possibly network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
· Conduct log analysis and triage in support of incident response.
· Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.
· Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
· Lead Incident Response activities and mentor junior SOC staff.
· Work with key stakeholders to implement remediation plans in response to incidents.
· Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
· Flexible and adaptable self-starter with strong relationship-building skills
· Strong problem solving abilities with an analytic and qualitative eye for reasoning
· Ability to independently prioritize and complete multiple tasks with little to no supervision
Basic Qualifications:
· Bachelors degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field plus 3 years of relevant experience
· Minimum of 7 years of professional experience in incident detection, response and remediation.
· Minimum of five (5) but (7) preferred years of specialized experience in one or more of the following areas:
o Email security
o Digital media forensic
o Monitoring and detection
o Incident Response
o Vulnerability assessment and pen test
o Cyber intelligence analysis
· Must have at least the SANS or CCNA certification.
· Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.
Shift schedule: 7pm-7am, Thurs-Sat, every other Wednesday.
· Utilize state of the art technologies such as Endpoint Detection & Response tools, log analysis (Splunk) and possibly network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
· Conduct log analysis and triage in support of incident response.
· Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.
· Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
· Lead Incident Response activities and mentor junior SOC staff.
· Work with key stakeholders to implement remediation plans in response to incidents.
· Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
· Flexible and adaptable self-starter with strong relationship-building skills
· Strong problem solving abilities with an analytic and qualitative eye for reasoning
· Ability to independently prioritize and complete multiple tasks with little to no supervision
Basic Qualifications:
· Bachelors degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field plus 3 years of relevant experience
· Minimum of 7 years of professional experience in incident detection, response and remediation.
· Minimum of five (5) but (7) preferred years of specialized experience in one or more of the following areas:
o Email security
o Digital media forensic
o Monitoring and detection
o Incident Response
o Vulnerability assessment and pen test
o Cyber intelligence analysis
· Must have at least the SANS or CCNA certification.
· Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.