Cyber Security Analyst
- Full-time
Company Description
K3 Solutions, LLC (K3) is a leading technical solutions and services company, that offers a broad range of expertise in systems modernization efforts, applications support, and business process management services. Our collaborative approach, innovative solutions, and focus on adding value provides our clients with a cost-effective path to addressing, managing, and achieving all of their mission objectives and business goals.
Job Description
Security Monitoring - Responsible for the security monitoring and reporting of IT system resources; Responding to and investigating incidents identified by SOC; Defining the monitored activities that are logged and monitored to detect abnormal or unusual activities that may need to be investigated; Providing 24x7 CSIRT response; Preparing management reports; Managing, maintaining, and updating supporting Security Monitoring technologies; Working with technology owners to ensure successful delivery and security of audit/log data.
-Analyze security data including intrusion detection system (IDS) events, system logs, Firewall Logs, network traffic analysis in response to security events and incidents;
-Implement new technologies / processes to support Information Security intrusion detection activities;
-Monitor security intelligence feeds and analyze impact to system infrastructure.
Intrusion Detection - Consult/Assist in the monitoring of network and host security infrastructure. Consult/Assist in the performance of impact assessments and validation of attacks (successful/unsuccessful) against the IT infrastructure; Assist in the design, deployment, and configuration of countermeasures as appropriate; Reviewing/identifying current vulnerabilities, attacks and appropriate countermeasures. Interface with other technology owners to ensure proper detection of potential security issues.
-Understand business impact of security incidents and recommend corrective or preventative action.
Vulnerability Management - Collect vulnerability and threat information from vendors, researchers, and other sources; Perform correlation of threat/vulnerability sources to provide recommendation on potential actions and assessment of overall security threat posture.
Incident Management - Conduct Information Security Investigations/Forensics analysis; Participate in Computer Security Incident Response teams.
-Collect, preserve, and analyze computer evidence in support of Information Security investigations / Incident Response process.
Qualifications
MUST BE STRONG with EnCase
Skill level: Senior (7+ yrs.)
Previous Security Operations Center (SOC) experience
-Prior Forensic Analysis experience preferred. Experience using EnCase Forensics, FTK, Helix, and other open source tools a plus.
-Must be able to work independently and in a team environment
Finance and /or Mortgage experience required
Additional Information
Education/Experience
-4-year degree in Information Security, Computer Science, Information Technology, Management Information Systems or equivalent work experience
-GSEC, GCIH, CCNA, CISSP or similar security related industry certification
-Experience in system administration/security administration of multiple platforms and operating systems such as Solaris/AIX/Linux and Microsoft Windows Server
-Demonstrated knowledge of network security, protocols, architecture and packet analysis
-Strong knowledge of malware and anti-malware tools
-Experience with the following security technologies is required: Intrusion Detection Systems (IDS), Vulnerability Scanners, Forensics Tools, Malware Analysis tools, Log Collection systems, SIEMs, Data Loss Prevention and End Point Solutions.
-Strong technical analysis writing and communication skills
Security Clearance Requirement
None
Email your resume to [email protected].