Job Details

ID #44636591
State New York
City New york city
Job type Contract
Salary USD TBD TBD
Source QED National
Showed 2022-08-06
Date 2022-08-05
Deadline 2022-10-04
Category Et cetera
Create resume

Sr. IT Security Operations Analyst

New York, New york city, 10008 New york city USA

Vacancy expired!

A NYS agency located in New York, NY is looking for a Sr. IT Security Operations Analyst for a 12 month contract.

Please note that this position will allow for consultant to work remotely. However, duties will require consultant to work onsite 3 days per week. Therefore, will be critical for the consultant to be local to NYC and able to travel to office without issue, as needed at own expense.

To be considered for this position, the client has advised that upon placement, consultants will be required to wear a mask under certain circumstances, show proof of full vaccination or submit on a weekly basis proof of a negative COVID-19 PCR diagnostic test.

Critical Key Requirements

  • Critical Thinker & Analytical Aptitude
  • SIEM Experience (Splunk)
  • Tier II SOC Incident Handling & Investigation
  • 24/7 Security Operation Center Experience
  • Threat Detection & Response Experience
  • Threat Detection Technologies Experience

Qualifications Experience & Education

  • Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations.
  • Organizational, decision making, and communications skills.
  • Knowledge of network security operations with a solid understanding of the technology and attention to detail.
  • Creative problem-solving abilities, coupled with a desire to take on responsibility.
  • Strong team player with the ability to engage and promote a cohesive unit.
  • Ability to handle multiple tasks in a fast-paced environment and prioritize highly varied work in order to maintain required productivity levels.
  • Ability to communicate technical' info and ideas so others will understand.
  • Ability to make appropriate decisions considering the relative costs and benefits of potential actions.
  • Ability to apply collaborative skills and traits that create solutions and results to unexpected situations.
  • Bachelor's degree in Computer Science, Cyber Security, Information Technology or related discipline OR a satisfactory equivalent with 4-6 years of Information Technology experience.
  • Security Event Monitoring, Network Event monitoring, Email Header Analysis, Packet Capture inspection, Malware Triage & Analysis, SIEM (Splunk) & TIP Experience
  • 4-6 years' experience: Information Security

Responsibilities

  • SIEM: The ability to conduct correlated searches and analysis utilizing a Security Incident & Event Management system.
  • Network: The ability to Analyze and dissect packets and validate threat signatures
  • Endpoint: Ability to perform basic static forensic analysis of Systems and Files
  • Email: Demonstrated ability to analyze email attributes such as Headers, and the ability to apply appropriate countermeasures to enhance email defense
  • Cloud: The ability to analyze anomalous detected traffic based on defined attack policies, ability to validate the treat and then determine remediation steps and present findings)
  • User & Entity Behavior Analytics: demonstrated capability to recognize and respond to various anomalous patterns of User's and Entity's activity to detect malicious intent.
  • Web Application: familiarity with various types of code-based attacks and the ability to detect and respond to them
  • Data Loss Prevention: Demonstrated capability to analyze DLP events and the ability to detect Data exfiltration through covert channels.
  • Document As-Is and To-Be playbooks for existing and future processes.
  • Coordinate and facilitate meetings such as process reviews, requirements, and various status reports
  • Perform Tier 2 SOC follow-up and remediation activity on escalated incidents.
  • The Tier 2 level Analyst (Senior Analyst) should have the ability to respond to a wide range of escalated Incidents and follow through with incident lifecycle through completion.

About us: QED National is a leading IT consulting, solutions, and staff augmentation firm, serving both the public and private sectors for over 29 years. Headquartered in midtown Manhattan, QED National's team is comprised of the brightest minds in the industry with the skills to solve the most complex technological problems.

Vacancy expired!

Subscribe Report job