Salary
💰 $100,555 - $136,045 per year
Tech Stack
CloudCyber SecurityLinuxOpen SourcePythonSplunkTCP/IP
About the role
- Performs forensic analysis of digital information and gathers and handles evidence.
Identifies network computer intrusion evidence and perpetrators.
Lead analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24X7 SOC environment.
Serve as technical point of escalation and mentor junior SOC analysts.
Investigate incidents, analyze attack methods, research defense techniques and tools, develop security policy, and document procedures.
Familiar with malware analysis and extract indicators of compromise.
Perform data security event correlation between various systems.
Prepare reports, summaries, and client-facing communications.
Maintain familiarity with industry trends and security best practices.
Ensure compliance with SLA, process adherence, and process improvement to achieve operational objectives.
Requirements
- Active SECRET security clearance
BA/BS Degree (or three (3) years of additional experience in lieu of degree)
Seven (7+) years of related experience
Strong knowledge of TCP/IP protocols, basic networking
Ability to parse/analyze network logs (proxy, firewall, antivirus, email, etc.)
PCAP analysis (Wireshark familiarity, Trellix)
IDS (Snort, Suricata, etc.)
Familiarity with typical attack/exploit techniques (OWASP top 10, command injection, obfuscated code)
Significant expertise in SIEM (Splunk, ArcSight, Crowdstrike, etc.)
Threat Intelligence (Open source feeds, IOCs, Known APT TTPs)
Threat Hunting (analyst mindset)
Scripting (Ideally Python, PowerShell, Bash)
Command line Interface Linux (basic concepts)
Knowledge of Enterprise Windows configurations (Active Directory)
Written communications skills (client-facing)