For further inquiries regarding the following opportunity, please contact one of our Talent Specialists
Lavanya at 224 369 0873
Dipankar at 224 507 1264
Title: Cyber Security Analyst (REMOTE)
Duration: 6 Months (Contract to Hire)
Location: REMOTE
Time zone: Eastern, hours are 7a to 4p in order to overlap with EU team
Job Responsibilities:
• Cyber Defense Operations activity including:
o Investigating and responding to DLP alerts.
o Investigating and responding to Insider Risk management alerts.
o Processing trainable classifiers.
o Metrics gathering and management.
• Help finalize the DLP/IP services.
• Help develop Threat-hunting and Intelligence services.
Projects:
1. Data Loss Prevention (DLP) deployment
2. Insider Threat Program Development
3. Threat Intelligence Program Development
4. Technical Skills Required:
Technical Skills Required:
The individual can conduct vulnerability scans and recognize vulnerabilities in security systems, ensuring the robustness and resilience of these systems. They can accurately and completely source all data used in intelligence, assessment, and planning products, ensuring the reliability and comprehensiveness of these products. They can apply cybersecurity and privacy principles to organizational requirements, ensuring the confidentiality, integrity, availability, authentication, and non-repudiation of the organization’s data and systems. It would be beneficial if they had some project management or development ability.
Familiarity with Microsoft Purview and Sentinel
A0015: Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
A0066: Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
A0123: Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Specialized Skills Required:
T0020: Develop content for cyber defense tools.
T0088: Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
T0155: Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
T0164: Perform cyber defense trend analysis and reporting.
T0166: Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
T0187: Plan and recommend modifications or adjustments based on exercise results or system environment.
T0198: Provide daily summary reports of network events and activity relevant to cyber defense practices.
T0258: Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
T0259: Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.
T0292: Recommend computing environment vulnerability corrections.
T0293: Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR).
T0294: Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
T0332: Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.
T0469: Analyze and report organizational security posture trends.
T0475: Assess adequate access controls based on principles of least privilege and need-to-know.
T0503: Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.
T0526: Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
T0545: Work with stakeholders to resolve computer security incidents and vulnerability compliance.
T0548: Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.
Interview Process:
With the hiring manager
With Cyber Defense Associate
Educational Requirements:
- At least three years of work experience in Information Technology, Networking, or Information Security.
- Work experience with or certification with Microsoft Purview tooling.
Pay Rate/Salary: USD 65-70/Hourly/W2
Tax Terms: W2
Experience: 7 year
Primary Skills: Information Security, Networking, Information Technology
Notes: If you’re interested with the above job, please click button [Apply the job @Company’s site] below to brings you directly to the company’s site.
Job Features
Job Category | Engineering |
Job Reference No | DIV8100 |
Posting Date | 2023-12-05 10:44:29 |
Job Location | Remote, USA |