Security Threat Analyst - Social Engineering
Information Technology company
Information Technology company
Jacksonville, FL 32256
W-2 onlyContract17288 views
Jacksonville, FL 32256
Contract
Questions?
Click to chat now!
This posting is no longer accepting new applicants
This posting has been closed

Job Description:

The IT Security Threat Analyst, under limited supervision, develops, maintains, and implements a comprehensive information security monitoring and threat analysis program including defining security policies, processes and standards for large and complex environments. Responsible for comprehensive threat analysis and recommending the appropriate course of action and escalating. Perform audit assessments and define processes and standards to ensure that security configurations are maintained and proactively identifies that they have not been inappropriately modified. Assist third-party incident response teams and law enforcement agencies by providing logs, reports, alert notifications, and other requested information.

Responsibilities:

Serves as a liaison with IT and business area partners to identify, understand, document and advise on security requirements, impacts and risks and threats. Provides third level, threat analysis by proactively and automatically correlates and analyzes threat data from various sources and analyzes network events to establish the identity and modus operandi of malicious users active in the computing environment or posing potential threats to the computing environment Independently, but with some level of guidance from Senior IT Threat Analyst, conducts industry research and technical evaluation of all-sources and vendor supplied intelligence--with specific emphasis on network operations and advanced, sophisticated cyber tactics, techniques, and procedures Preparing assessments and cyber threat profiles of current events based on collection, research and analysis of open source information. Under some level of guidance, develops and publishes high-quality intelligence work products and after-action reviews. Assist in performance of incident response and forensic security investigations. Proven technical knowledge of security and technical architectures, tools and controls with specific demonstrated experience in proactive detection, mitigation, and resolution of advanced cyberattacks and or threats Proven technical knowledge of security and technical infrastructures including security firewalls, data loss prevention, encryption, and end point protection appliances Demonstrated knowledge of information threat analysis and detection concepts and principles and impact Experience working and managing vendor performance and service level agreements Conducts and, at times, leads root cause analysis of any monitoring alerts and threats identified by third-party vendor, or internal systems and workforce. Once root cause is determined, proposes and works with other teams, if required, to implement appropriate security controls and solutions that will mitigate risk and vulnerabilities, as well as safeguard our systems and data. Assists in the preparation of detailed technical papers, presentations, recommendations, and findings for Management and other Technology Leaders Can be asked to provide briefings and presentations to colleagues and leadership supporting analysis of cyber threats Serves as first point of contact for third party monitoring vendor and internal areas that identify any monitoring alerts and threats Develops and maintains documentation for security monitoring and threat procedures and security diagrams

Requirements:

  • 6+ years related work experience or equivalent combination of transferable experience and education.
  • Related Bachelor's or Master's degree or additional related equivalent work experience.
  • Strong technical knowledge of security and technical architectures, tools and controls with specific demonstrated experience in proactive detection, mitigation, and resolution of advanced cyberattacks and or threats.
  • Strong technical knowledge of security and technical infrastructures including security firewalls, data loss prevention, encryption, and end point protection appliances
  • Demonstrated knowledge of information threat analysis, threat modeling, and detection concepts and principles and impact.
  • Experience working and managing vendor performance and service level agreements Knowledge of network infrastructure including routers, switches, firewalls and associated network protocols and concepts.
  • Strong technical knowledge of current systems, software, protocols and standards. (including TCPIP and network administration protocols).
  • Experience developing, documenting and maintaining security procedures.
  • In-depth knowledge of operating systems and security applications.
  • Proven ability to work under stress in emergencies with flexibility to handle multiple high-pressure situations simultaneously. Ability to communicate highly complex technical information clearly and articulately for all levels and audiences.
  • Ability to manage tasks independently and take ownership of responsibilities Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel.
  • Ability to adapt to a rapidly changing environment and quickly identify new trends and industry changes specific to security and advanced cyberattacks.
  • High critical thinking skills required to evaluate complex, multi-sourced security intelligence information, analyze and confirm root cause, an independently, or at times with the assistance of a Senior IT Threat Analysts or third-party vendor.
  • Identify mitigation alternatives and solutions that safeguard our technical environment.
  • Demonstrated advanced proficiency with Network components and design and tools used to administer security in these environments.
  • Demonstrated advanced proficiency with Windows and UNIX environments and tools used to administer security in these environments.
  • Demonstrated advanced proficiency with Database environments and tools used to administer security within the various databases, e.g., UDB, DB2, SQL and Oracle Advanced level
  • Experience with application design and development to include next generation programming and scripting.
  • Ability to perform application security testing.

Preferred Qualifications:

  • 3 years of Security Operations Center Threat Analysis experience including, but not limited to investigations, threat hunting, and incident response Relevant certifications
  • Experience using Agile methodology Demonstrated proficiency with Social Engineering Education, Process Review, Simulated Phishing Campaigns, Suspicious Email Reporting, and Covert Social Engineering Operations.

Additional Information:

  • Implementation of an integrated Simulated Phishing Platform with automated awareness training that provides continuous simulated phishing testing campaigns with integrated training and reporting. integrated suspicious email button and reporting, and USB drive testing.
  • The individual would also support targeted Social Engineering education to high risk areas. Identification and analysis of high-risk areas processes that are susceptible to social engineering attacks that would have a large impact on the organization and recommend changes, and facilitation of covert options to test high risk areas of the organization identify deficiencies and work with appropriate businessIT leaders to address accordingly.
Skills
Skill Proficiency Years Experience Percent Used
Security Analyst
1 - 3100%
Information Security
3 - 675%
Social Engineering
Any75%
Auditing
Any50%
SQL
Any50%
UNIX
Any50%
Windows
Any50%
Agile Methodology
Any25%
Applications Security
Any25%
DB2
Any25%
Firewall
Any25%
Network Infrastructure
Any25%
Oracle
Any25%
Scripting
Any25%
Security Monitoring
Any25%
Security Testing
Any25%