NexThreat is hiring: Cybersecurity Analyst (Mid) in Clarksburg
NexThreat - Clarksburg, WV, United States, 26306
Work at NexThreat
Overview
- View job
Overview
Location: NCR or Clarksburg
Job Category: Information Technology
Time Type: Full-time
Clearance Requirement: Current TS/SCI Clearance required
Security Suitability: Must pass FBI security suitability
Polygraph Requirement: Must pass an FBI administered Counterintelligence polygraph if one has not been conducted within the last five years.
Employee Type: W2 or 1099
Citizenship: US Citizen, no Dual Citizenship
Summary:
NexThreat is seeking Cybersecurity Analyst (Mid). The Mid-Level Cybersecurity Analyst is an integral part of the Watch Floor Team within the Security Operations Center (SOC). This team operates around the clock, 24/7, 365 days a year, ensuring the timely detection and resolution of potential security incidents. By minimizing the impact of cyber threats, the team plays a crucial role in safeguarding the confidentiality, integrity, and availability of the organization's information assets. The Mid-Level Analyst is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats.
Key Responsibilities:
• Monitor security events and alerts using industry-standard tools to identify potential threats and vulnerabilities.
• Analyze and investigate security incidents, documenting findings and recommending remediation steps.
• Collaborate with the Watch Floor Team to ensure efficient incident detection and response.
• Assist in developing and refining incident response procedures and playbooks.
• Generate reports on security incidents, trends, and recommendations for management review.
• Participate in ongoing training and professional development to enhance cybersecurity skills and knowledge.
• Contribute to the enhancement of SOC processes, tools, and technologies to improve overall efficiency.
Unique Skills/Tasks/Software:
• Required:
o Proficiency in using Splunk Enterprise Security for monitoring and analysis of security events.
• Preferred:
o Familiarity with Microsoft Sentinel for cloud-based security operations.
Certifications (Preferred):
• GIAC Continuous Monitoring Certification (GMON)
• GIAC Certified Incident Handler (GCIH)
• GIAC Certified Forensic Analyst (GCFA)
• GIAC Certified Intrusion Analyst (GCIA)
• GIAC Network Forensic Analyst (GNFA)
• GIAC Cloud Threat Detection (GCTD)
• GIAC Cloud Forensics Responder (GCFR)
Qualifications:
• Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
• Relevant experience (typically 3-5 years) in cybersecurity analysis or a similar role within a SOC environment.
• Strong analytical and problem-solving skills, with the ability to prioritize tasks in a fast-paced environment.