Job Description
### Job Description: Security Analyst - SIEM & Cyber Defense
We're seeking a skilled Security Analyst to join our team and play an integral role in supporting our 24/7 Security Operations Center (SOC). The ideal candidate will have a passion for cybersecurity and a strong background in Security Information and Event Management (SIEM) systems, specifically with experience in Azure Sentinel.
This role involves conducting in-depth investigations and "hunting" activities to identify and mitigate potential threats. You will use advanced SIEM technologies like Splunk to monitor, analyze, and respond to security events, ensuring the safety of critical network resources.
Location: Austin, TX (Remote candidates will also be considered).
Shift: Must be willing to support non-business hours shifts, including on-call and rotating schedules.
### Key Responsibilities
- Network Traffic Analysis: Monitor and analyze network traffic to identify potential security threats and unusual activity.
- Incident Escalation: Document, escalate, and track security incidents, detailing their status, impact, and necessary follow-up actions.
- Trend Analysis & Reporting: Perform trend analysis to identify emerging threats and report on security trends and cyber defense activities.
- Event Correlation & Investigation: Correlate security events from various sources to identify attacks or vulnerabilities, and determine their impact.
- Detection & Alerting: Detect, identify, and alert on potential attacks, intrusions, and misuse across the network.
- Signature Development: Assist in creating signatures for defense tools to combat new and observed threats.
- Vulnerability Assessment: Conduct research and analysis to identify system vulnerabilities and recommend corrective actions.
- Cybersecurity Recommendations: Provide leadership with insights and recommendations based on threat analysis.
### Preferred Qualifications
- Experience: At least 8 years of experience in Security Incident Response, SOC, or threat analysis.
- SIEM Knowledge: Hands-on experience with enterprise-level or cloud-based SIEM technologies, including Splunk and Azure Sentinel.
- Certifications:
- CompTIA Security+
- Splunk Power User Certification (preferred)
- Additional certifications such as Certified Ethical Hacker (CEH) or Certified Incident Handler (GCIH/ECIH) are a plus.
- Technical Skills:
- Experience with network protocols, intrusion detection systems, and cybersecurity tools.
- Knowledge of vulnerability management, encryption algorithms, and cyber defense principles.
- Ability to analyze network tools and interpret data to detect intrusions.
### Additional Skills & Qualities
- Strong communication skills, both verbal and written, with the ability to effectively present information to teammates, customers, and technical leads.
- Ability to work independently with minimal supervision.
- Strong analytical mindset with a detail-oriented approach to cybersecurity.
- A team player who enjoys mentoring and training others as needed.
### Candidate Requirements
- Security Clearance: Ability to pass background checks, including CJIS clearance.
- Work Schedule: Must be available to support rotating shifts and on-call responsibilities.
- Citizenship: US Citizenship is required.
### Why Join Us?
- Work in a dynamic and fast-paced environment where your contributions directly impact cybersecurity operations.
- Opportunities for growth and advancement in the cybersecurity field.
- Be part of a dedicated team that plays a key role in defending against cyber threats and ensuring the integrity of critical systems.
If you're passionate about cybersecurity and have the skills and certifications listed, we encourage you to apply. Come help us protect networks, data, and digital infrastructures from evolving cyber threats!
Employment Type: Full-Time
Salary: $ 60.00 65.00 Per Hour
Job Tags
Hourly pay, Full time, Shift work, Rotating shift,