Security Analyst Global Security Operations Center (SOC) Part Time
About Schubring Global Solutions
Our approach is straightforward. Our team has been on both sides of the table, and we firmly believe in treating our customers the way we would expect to be treated. Every member of our team embraces our core values. We will not compromise our integrity and we will only act in our customers best interests.
As security practitioners, we embrace the impact of our actions and recommendations on our customers and their people. We operate as trusted partnersbecause that is what we are.
We are seeking a Security Analyst (SA) to become a valued member of our team supporting a rapidly growing global technology client.
The SA will be part of a GSOC team responsible for continuously monitoring the global network for breaches and anomalous activity. The SA will detect, analyze, and limit intrusions and security events. The SA will work collaboratively to detect and respond to information security incidents; maintain and follow procedures for security event alerting; and participate in security investigations.
Additional responsibilities include monitoring, research, classification, and analysis of security events within our environment. The ideal candidate will have security industry knowledge that evolves with current and emerging vulnerabilities and threats, as well as an ongoing understanding of key business and technological processes.
Key Responsibilities:
- Assist in establishing a mature Security Operations Center discipline to support managed security services focused on vulnerability and security information event management engagements.
- Monitor and analyze Security Information and Event Management (SIEM) and other tools to identify security issues for remediation.
- Monitor and analyze alerts from multiple security systems.
- Communicate, escalate, and mitigate alerts regarding intrusions and compromises.
- Conduct operations surrounding cyber security incident response technologies, including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host-based forensics.
- Perform scanning and monitoring activities to identify vulnerabilities and threats.
- Document actions and investigation results, maintaining incident logs and communicating findings to stakeholders.
- Participate in root cause analysis and lessons learned sessions.
- Establish and maintain relationships with cybersecurity and infrastructure support teams across the organization.
Education:
- Bachelors degree in Cybersecurity, Computer Science, or related technical field, or 4 additional years of relevant experience from military or public sectors.
Qualifications:
- 5 years of IT experience, with at least 2 years in information security within security operations and monitoring threats via a SIEM console.
- Knowledge of NIST SP 800-61 Revision 2, TCP/IP Networking, OSI model, and cyber defense strategies like the Cyber Kill Chain.
- Experience analyzing log files, performing packet and malware analysis, and creating actionable security content.
- Strong customer service and decision-making skills.
- Ability to obtain Microsoft SC-200 certification within 90 days if not already certified.
Desired Qualifications:
- Relevant security certifications such as CISSP, CEH, GIAC certifications (GCIA, GNFA, GCIH).
Other:
- Must pass a background check for security clearance.
SGS is an Equal Opportunity Employer. All qualified applicants will be considered without regard to race, color, religion, sex, pregnancy, sexual orientation, national origin, age, veteran status, or disability.
Apply here:
The pay range for this role is $38.64 per hour in Sterling, VA.
#J-18808-Ljbffr