Posted on Dec 4, 2019 by Request Technology
A Fortune 500 company is on the search for a Security Operations Center Analyst.
This role is a right fit for you if you have 3+ years of experience with intrusion detection, incident response/handling, and Firewall administration. This role is revolved around incident and event management, log analysis, network traffic analysis, malware investigation/remediation, SIEM correlation logic and alert generation.
- Ideal candidate will have 3+ years of security related experience in areas such as intrusion detection, incident response/handling, Firewall administration, etc.
- Experience with command line interface and some level of exposure to administering systems and services for various operating systems.
- Knowledge of security incident and event management, log analysis, network traffic analysis, malware investigation/remediation, SIEM correlation logic and alert generation
- Demonstrated ability to analyze, triage and remediate security incidents
- Understanding of Security principles, techniques and technologies such as SANS Top 20 Critical Security Controls and OWASP Top 10
- Ability to manage multiple priorities simultaneously
- Moderate knowledge of networking fundamentals (TCP/IP, Network Layers, etc.)
- Moderate knowledge of malware operation and indicators
- Moderate knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)
- Moderate knowledge of security related technologies and their functions (IDS, IPS, EDR, IRP, FW, WAF, SIEM, etc.)
- Moderate protocol analysis experience (Wireshark, tcpdump, Netwitness, Snort, Bro, etc.)
- Basic knowledge of audit requirements (PCI, HIPPA, SOX, etc.
- Certified Incident Handler (GCIH)
- Certified Intrusion Analyst (GIAC)
- Certified Ethical hacker (CEH)
- Certified Expert penetration tester (CEPT)
- Certified Information Systems Security Professional (CISSP)
- Networking Certifications (CCNA, etc.)
- Platform Certifications (Microsoft, Linux, Solaris, etc.)