Logo
Artech Information System LLC

Information Security Analyst

Artech Information System LLC, Washington, District of Columbia, us, 20022

Save Job

Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Description

Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months Essential Job Functions

Monitor Security Events from IDS, SIEM, etc. Log tickets to the Ticketing System Handle calls from the MSSP (Managed Security Service Provider) & users regarding incidents/events, perform triage, resolve problems, or escalate to team members Perform triage on alerts from all sources including monitored email distribution lists Participate in rotating weekly shift supporting off hours and weekend activity (24x7) Produce ad hoc reports and other ad hoc tasks Qualifications

Required Skills/Abilities: Monitoring skills related to IDS and SIEM Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts Understanding of Windows Registry, File system, etc. Hands-on knowledge of Network Packet Analysis using tools Ability to work with team members with varying levels of technical skills and diverse international backgrounds Strong understanding of Networking and Operating systems concepts Ability to adapt to and function in a project environment with multiple timetables and changing priorities Ability to learn new concepts and approaches in analyzing Security Incidents Good communication skills (Verbal and Written) Educational Qualifications and Experience: Education: Bachelor's degree in Computer Science or Information Systems Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling Experience with Firewalls and information security technologies Experience with CERT/CSIRT/CIRT/SOC Certification Requirements: Any two certifications would be a plus: CEH, Security +, CCNA Additional Responsibilities

Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containment Hands-on experience of Incident Response/Malware analysis Advanced Responsibilities

Perform advanced Malware Analysis, along with Incident Response Generate detailed Malware Analysis reports on PE and other common file structure samples Provide actionable intelligence and suggestions for control updates based on reverse engineering and malware analysis Assist OIS in identifying zero-day/vulnerable applications and impact Experience Matrix for Levels:

Level I - 2+ years of experience Level II - 5+ years of experience Level III - 7+ years of experience Note: The specific shift he wants to get covered is the 12pm-8pm EST window. Strong experience in SOC environment and great soft skills/customer service required. Candidates must be able to attend an in-person interview.

#J-18808-Ljbffr