Jobs
>
Austin

    Security Analyst - Austin, United States - TEKsystems

    Default job background
    Description

    Job Description

    Job Description

    Top Skills' Details
    Strong knowledge of SEIM/Security Suite knowledge preferred, they are using AZURE Sentinel so someone had this experience that would be a huge plus
    Experience with SEIM ES configuration, tuning and incident investigation
    Experience with log ingestion into the SEIM by raw log ingestion, email, and API.
    Create and manage custom parsers . 24/7 environment.
    Ability to manage (add, modify and delete) data feeds between monitored devices and the SIEM)


    Job Description


    This is an analyst role and candidate must be able to demonstrate ability to perform and support in-depth investigations and 'hunting' activities.

    Demonstrated experience in using the Splunk Enterprise Security SIEM technologies as an analyst is REQUIRED. Holding the Splunk Power User Certification is PREFERRED. Holding Certified Ethic Hacker (CEH) and/or Certified Incident Handler (GCIH or ECIH) credentials is a plus for this position.


    This position is ideally based in AUSTIN, TX (the right remote candidate can be considered), and will support the customer's 24x7 Security Operations Center (SOC).

    This position is in direct support (on-site at customer facilities) of an AT&T customer in the government sector.

    AT&T is providing Managed Security Service Provider (MSSP) functions related to the Security Operations Center (SOC) including Tier 1 through Tier 3 resource capabilities and activities related to security monitoring, threat, and vulnerability management and incident response (IR).

    Preference will be made for candidates who can support 'non-business hours' shifts.


    Responsibilities

    • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
    • Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to
    the environment.


    • Perform cyber defense trend analysis and reporting.
    • Perform event correlation using information gathered from a variety of sources within the enterprise or MSSP environment to gain situational awareness and
    determine the effectiveness of an observed attack.


    • Provide daily summary reports of network events and activity relevant to cyber defense practices.
    • Receive and analyze network alerts from various sources within the environment and determine possible causes of such alerts.
    • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents
    and events from benign activities.


    • Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.
    • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
    • Determine tactics, techniques, and procedures (TTPs) for intrusion sets.
    • Recommend computing environment vulnerability corrections.
    • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
    • Create and document procedures and work instructions for use by the SOC staff (Tier 2 through Tier 3).
    • Train and mentor other analysts as needed.
    • Validate events/alerts received from all monitored security systems against network traffic using packet analysis tools.
    • Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the
    network environment or enclave.


    • Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense
    threat condition and determine which security issues may have an impact on the enterprise.


    • Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
    Candidate Requirements

    Candidate should have strong communications skills, both written and verbal, be comfortable presenting information to teammates, customer technical personnel and AT&T Leads and Managers.


    The preferred candidate is REQUIRED to have:

    • Eight (8) years of Security Incident Response, Security Operations Center, and/or threat analysis experience.
    • Demonstrated experience using either an Enterprise/MSSP and or cloud Security SIEM technologies as an analyst.
    • Ability to support and work across multiple customer and bespoke systems.
    • Must be able to pass a CJIS background check process and other background checks to comply with customers contracts.
    • Complete basic safety and security training to meet the customer requirements.
    • Ability to work a rotating shift and on-call schedule as required.
    • CompTIA Security + certification or equivalent/higher
    • Splunk Power User Certification
    • Selected candidates must be US Citizens.

    Candidate Preferred Requirements
    The Preferred candidate holding one or more of the industry certifications will be a plus


    • Certified Ethic Hacker (CEH) or equivalent
    • Certified Incident Handler (GCIH or ECIH)
    • Other Certs - such as CompTIA Networking+, any Cloud Certifications, Devo, Splunk, Azure Sentinel

    Qualifying Experience and Attributes

    • Ability to create and maintain custom reports, dashboards and views utilizing the SIEM
    • Ability to create 'use cases' to customize the alerting of the SIEM to meet customer needs
    • Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
    • Ability to work independently with only minor oversight
    • Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
    • Knowledge of computer networking concepts and protocols, and Cyber security methodologies.
    • Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.
    • Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
    • Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
    • Knowledge of incident response and handling methodologies.
    • Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
    • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model
    [OSI], Information Technology Infrastructure Library, current version [ITIL]).


    • Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
    • Knowledge of security system design tools, methods, and techniques.
    • Knowledge of Virtual Private Network (VPN) security.
    • Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities.
    • Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations.
    • Knowledge of adversarial tactics, techniques, and procedures.
    • Knowledge of network tools (e.g., ping, traceroute, nslookup)
    • Knowledge of defense-in-depth principles and network security architecture.
    • Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
    • Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).
    • Knowledge of interpreted and compiled computer languages.
    • Knowledge of cyber defense and information security policies, procedures, and regulations.
    • Knowledge of the common attack vectors on the network layer.
    • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
    • Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored).
    • Knowledge of system administration, network, and operating system hardening techniques.
    • Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network
    exploitation, covering tracks).


    • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
    • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
    • Signature implementation impact for viruses, malware, and attacks.
    • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
    • Knowledge of Mitre ATT&CK and Mitre D3FEND
    • Knowledge of the Lockheed-Martin Cyber Kill Chain
    • Knowledge of common cybersecurity frameworks, regulations, and compliance standards
    • Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
    • Skill in using protocol analyzers.
    • Skill in collecting data from a variety of cyber defense resources.
    • Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
    • Skill in reading and interpreting signatures (e.g., snort).
    • Skill in performing packet-level analysis.

  • COGNITIVE MEDICAL SYSTEMS INC

    Security Analyst

    6 days ago


    COGNITIVE MEDICAL SYSTEMS INC Austin, United States

    **Company Description**: Cognitive Medical Systems is seeking a talented and motivated Security Analyst to join our team and play a key role in safeguarding our systems, data, and infrastructure against potential threats. · **Position Overview**: As a Security Analyst at Cognitiv ...

  • Vector Consulting, Inc

    IT Security Analyst

    6 days ago


    Vector Consulting, Inc Austin, United States

    Our government client is seeking an experienced IT Security Analyst on a hybrid 6+ months renewable contract opportunity in Austin, TX. · Role: IT Security Analyst · Job Description / Minimum Requirements: · The agency requires the services of (1) Security Administrator- Speciali ...

  • Vector Consulting, Inc

    IT Security Analyst

    6 days ago


    Vector Consulting, Inc Austin, United States

    Our government client is seeking an experienced IT Security Analyst on a hybrid 6+ months renewable contract opportunity in Austin, TX. · Role: IT Security Analyst · Job Description / Minimum Requirements: · The agency requires the services of (1) Security Administrator- Speciali ...

  • Apex Systems

    IT Security Analyst

    2 days ago


    Apex Systems Austin, United States

    Title: IT Security Analyst · Location: Austin, TX · Long Term Contract with potential to convert to FTE · W2 or C2C · Must Have atleast 50% of the items listed below Administration and configuration Carbon Black Defense · Administration and configuration with Exchange Online ...

  • Vector Consulting

    IT Security Analyst

    1 week ago


    Vector Consulting Austin, United States Contract

    Our government client is seekingan experienced IT Security Analyst on a hybrid 6+ months renewable contract opportunity in Austin, TX . · Role: IT Security Analyst · Job Description / Minimum Requirements: · The agency requires the services of (1) Security Administrator- Speci ...

  • Marga Consulting LLC

    Security Analyst

    2 days ago


    Marga Consulting LLC Austin, United States

    Expertise in OKTA, Access Gateway, Single Sign-On, Adaptive MFA, Universal directory, Advanced Server Access, API Access Management, Secure authentication, access management systems, Identity as a Service (IDaaS), WS-Federation, OAuth, OpenID Connect, Workflows and Life Cycle · M ...


  • LanceSoft Austin, United States

    Level Description · 1-3 years of experience in the field or in a related area. Has knowledge of commonly used concepts, practices, and procedures within a particular field. Relies on instructions and pre-established guidelines to perform the functions of the job. Primary job fun ...


  • PIMCO Austin, United States Full time

    We are a leading global asset management firm with over 3,000 employees across 20 offices in 15 countries; we help millions of investors around the world pursue their financial goals. · We hire critical thinkers. People who thrive in a collaborative culture like ours where we so ...


  • The Electric Reliability Council of Texas (ERCOT) Austin, United States

    At ERCOT, our diverse and dynamic work environment provides a platform on which employees can work together to build the future of the Texas power grid and wholesale market utilizing the latest technologies and resources. We encourage you to join our talented, dedicated workforce ...


  • NinjaJobs Austin, United States

    Available in these Cities: · Austin, TX, Atlanta, GA, Boston, MA, McLean, VA · The Security Operations team is responsible for designing and driving information security initiatives including defining policy, engineering defensive controls, and responding to incidents. We are lo ...


  • NinjaJobs Austin, United States

    Job Description · Job DescriptionAvailable in these Cities: Austin, TX, Atlanta, GA, Boston, MA, McLean, VA · The Security Operations team is responsible for designing and driving information security initiatives including defining policy, engineering defensive controls, and res ...


  • InterSources Austin, United States

    Must Have Skills Skill 1 - Any recognized security certifications, e.g., CISSP, CISA, CISM Skill 2 - Monitor internal and external threat landscape to update strategy and intellectual protection program roadmap · Skill 3 - Provide periodic reports to management team and key stak ...

  • NinjaJobs

    Lead Security Analyst

    3 weeks ago


    NinjaJobs Austin, United States Full time

    Available in these Cities: Austin, TX, Atlanta, GA, Boston, MA, McLean, VA The Security Operations team is responsible for designing and driving information security initiatives including defining policy, engineering defensive controls, and responding to incidents. We are looking ...


  • InterSources Austin, United States

    Must Have Skills Skill 1 – Any recognized security certifications, e.g., CISSP, CISA, CISM Skill 2 - Monitor internal and external threat landscape to update strategy and intellectual protection program roadmap · Skill 3 – Provide periodic reports to management team and key stake ...

  • BroadAxis, Inc

    Sr. Security Analyst

    22 hours ago


    BroadAxis, Inc Austin, United States

    Job Description · Job Description. CANDIDATE SKILLS AND QUALIFICATIONS · Minimum Requirements: · Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. · Years · Required ...


  • Texcelvision Austin, United States

    Job Description · Job DescriptionRespond by: 05/13/24 · Rate: DOE · Type: Contract · Please respond with resume and 3 references preferably supervisor (name, title, company, email, phone number) · Preference will be given to candidates who meet all preferred skills and have publi ...


  • Five Cubes Inc Austin, United States

    Job Title: · Network Security Analyst 1 · Location: Austin, TX · Duration: 6+ months · Direct Client · Job Description: · A network security analyst ensures that information systems and computer networks are secure. This includes protecting the company against hackers and c ...


  • GTT Austin, United States

    Job title: Senior Cyber Security Analyst · Location: Austin (must be within a commutable distance) · Salary: ~$80k · Role Summary: · The Senior Cyber Security Analyst leads enhancements to the Security Incident & Event Management (SIEM) platform to ensure the Cyber Security Oper ...


  • Five Cubes, Inc. Austin, United States

    Job Title: Network Security Analyst 1 · Location: Austin, TX · Duration: Long Term · Job Description:Require the services of one Network Security Analyst meeting the general qualifications of a Network Security Analyst 1 Category Type, Security and the specifications outlined ...


  • Abacus Austin, United States

    Solicitation Reference Number · Customer Name · Texas Health and Human Services Commission · Category · Security · Customer Entity Name · Health and Human Services Commission · Title · Data Security Analyst · Level · Data Security Analyst 1 · Estimated Hours · 2,000 · SSR Status ...