Cybersecurity Analyst (Senior) Job at NexThreat in Clarksburg
NexThreat - Clarksburg, WV, United States, 26306
Work at NexThreat
Overview
- View job
Overview
Location: NCR or Clarksburg
Job Category: Information Technology
Time Type: Full-time
Clearance Requirement: Current TS/SCI Clearance required
Security Suitability: Must pass FBI security suitability
Polygraph Requirement: Must pass an FBI administered Counterintelligence polygraph if one has not been conducted within the last five years.
Employee Type: W2 or 1099
Citizenship: US Citizen, no Dual Citizenship
Summary:
NexThreat is seeking a Cybersecurity Analyst (Senior), The Senior Cybersecurity Analyst plays a pivotal role within the Security Operations Center (SOC), specifically supporting the Watch Floor Team. Operating 24/7, 365 days a year, this dynamic team is essential for the timely detection and resolution of security incidents, thereby minimizing the impact of cyber threats on the organization. As a skilled security professional, the Senior Analyst is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats. This position serves as a critical component of the SOC, safeguarding the confidentiality, integrity, and availability of organizational information assets.
Key Responsibilities:
• Continuously monitor security events and alerts using advanced security tools and technologies.
• Analyze and investigate security incidents to identify root causes and recommend remediation steps.
• Collaborate with the Watch Floor Team to ensure efficient incident response and resolution.
• Develop and implement strategies to enhance the detection, prevention, and response capabilities of the SOC.
• Generate detailed reports on security incidents, trends, and vulnerabilities for management review.
• Provide mentorship and training to junior analysts, fostering a culture of continuous learning and improvement.
• Stay current with the latest cybersecurity threats, trends, and technologies to enhance the SOC's effectiveness.
Unique Skills/Tasks/Software:
• Required:
o Proficiency in using Splunk Enterprise Security for monitoring and analysis of security events.
• Preferred:
o Experience with Microsoft Sentinel for cloud-based security monitoring and incident response.
Certifications (Preferred):
• GIAC Continuous Monitoring Certification (GMON)
• GIAC Certified Incident Handler (GCIH)
• GIAC Certified Forensic Analyst (GCFA)
• GIAC Certified Intrusion Analyst (GCIA)
• GIAC Network Forensic Analyst (GNFA)
• GIAC Cloud Threat Detection (GCTD)
• GIAC Cloud Forensics Responder (GCFR)
Qualifications:
• Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
• Significant experience (typically 5+ years) in cybersecurity analysis or a similar role within a SOC environment.
• Strong analytical and problem-solving skills, with the ability to prioritize and manage multiple incidents simultaneously.