MILLENNIUMSOFT
Information Security Analyst
MILLENNIUMSOFT, San Diego, California, United States, 92189
Job Title – Information Security Analyst
Location - San Diego, CA
Duration – 3+ Months Contract
Client: Medical Device Company
Job Category: Operations
Employment Type: Contract on W2 (Need US Citizens Or GC Holders Only)
• Shift hours: 9-5
• Remote - must note location on submittal
• Interviews – video
• Education required: degree preferred but not required. If no degree, then CERTs requested. Certifications: CERT-Certified Computer Security Incident Handler Certification, CISSP, HCISSP
• Must haves on the resumes: SOC monitoring & detection
This person has experience with detecting and responding to information security incidents, maintaining, and following procedures for security alerting, and supporting security investigations. You are comfortable performing activities around monitoring, researching, classifying, and analyzing security events that occur focus on our hosted solutions platform.
This person has experience assisting with network analysis, intelligence tools and working across a matrixed environment to assess indicators and triage risk. You are comfortable providing fact-based reports to various levels of the organization within a fast-paced environment. You have previous SOC and Security Information Event Management (SIEM) experience, understand the fundamentals of reducing attack surfaces, and possess effective analytical skills.
Essential Job Functions:
The following duties and responsibilities are intended to be representative of the work performed by the incumbent(s) in this position and are not all-inclusive. The omission of a specific duty or responsibility will not preclude it from the position.
• Performs network security analysis, log-centric analysis (SIEM) and other security tools
• Monitoring intrusion detection systems and identifying host and network-based intrusions via intrusion detection technologies
• Triage alerts, collect data (i.e. full packet capture, application server logs, etc.) and diagnose observed activity
• Recognize threats and conduct analysis on those threats
• Provide written analysis of findings to communicate potential risks and impact in detailed reports
• Understand and report attacker Indicators of Compromise (IOCs)
• Analyze large volumes of network data for specific patterns or anomalies, to trend network activity
• Provide attack surface management training and development
• Manage risk reporting and escalation to cross-functional teams in a cooperative manner
• Must be able to work a flexible schedule, as needed, within a 24/7 Security Operations Center
• Assist with additional projects as needed
Basic Qualifications:
• In-depth knowledge of Windows operating systems, other OS’s such as IoS and Linux a plus
• In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
• Previous experience in Network monitoring platforms
• Preferred Certifications: CERT-Certified Computer Security Incident Handler Certification, CISSP, HCISSP
• Excellent analytical and problem-solving skills
• Proven ability to deliver tough messages in a professional manner. Proven ability to act independently and to execute with limited information and ambiguity.
Location - San Diego, CA
Duration – 3+ Months Contract
Client: Medical Device Company
Job Category: Operations
Employment Type: Contract on W2 (Need US Citizens Or GC Holders Only)
• Shift hours: 9-5
• Remote - must note location on submittal
• Interviews – video
• Education required: degree preferred but not required. If no degree, then CERTs requested. Certifications: CERT-Certified Computer Security Incident Handler Certification, CISSP, HCISSP
• Must haves on the resumes: SOC monitoring & detection
This person has experience with detecting and responding to information security incidents, maintaining, and following procedures for security alerting, and supporting security investigations. You are comfortable performing activities around monitoring, researching, classifying, and analyzing security events that occur focus on our hosted solutions platform.
This person has experience assisting with network analysis, intelligence tools and working across a matrixed environment to assess indicators and triage risk. You are comfortable providing fact-based reports to various levels of the organization within a fast-paced environment. You have previous SOC and Security Information Event Management (SIEM) experience, understand the fundamentals of reducing attack surfaces, and possess effective analytical skills.
Essential Job Functions:
The following duties and responsibilities are intended to be representative of the work performed by the incumbent(s) in this position and are not all-inclusive. The omission of a specific duty or responsibility will not preclude it from the position.
• Performs network security analysis, log-centric analysis (SIEM) and other security tools
• Monitoring intrusion detection systems and identifying host and network-based intrusions via intrusion detection technologies
• Triage alerts, collect data (i.e. full packet capture, application server logs, etc.) and diagnose observed activity
• Recognize threats and conduct analysis on those threats
• Provide written analysis of findings to communicate potential risks and impact in detailed reports
• Understand and report attacker Indicators of Compromise (IOCs)
• Analyze large volumes of network data for specific patterns or anomalies, to trend network activity
• Provide attack surface management training and development
• Manage risk reporting and escalation to cross-functional teams in a cooperative manner
• Must be able to work a flexible schedule, as needed, within a 24/7 Security Operations Center
• Assist with additional projects as needed
Basic Qualifications:
• In-depth knowledge of Windows operating systems, other OS’s such as IoS and Linux a plus
• In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
• Previous experience in Network monitoring platforms
• Preferred Certifications: CERT-Certified Computer Security Incident Handler Certification, CISSP, HCISSP
• Excellent analytical and problem-solving skills
• Proven ability to deliver tough messages in a professional manner. Proven ability to act independently and to execute with limited information and ambiguity.