What are the responsibilities and job description for the Cyber Threat Analyst II position at InfiCare Staffing?
Hi ,
Hope you are doing great.
InfiCare has been providing Contingent Staffing and Direct Hire staffing services to its clients across the US and in four continents Since 2001. Starting from a modest beginning in 2001, today we service clients ranging from Fortune 500 companies to medium sized businesses as well as small niche firms. In US we are based at Dulles, VA. We are hiring “Cyber Threat Analyst II at Morrisville NC” for one of our clients. If you are interested in this position, you can revert to my email or call me at 703-652-5162.
Request ID: 42931-1
Duration: 1 Yr.
Location work will be performed: Morrisville NC
Job Title: Cyber Threat Analyst II
Description
Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces finds to help initialize or support law enforcement and counterintelligence investigations or activities.
Details
3-5 years of experience with security operations and incident response
Education
Bachelor's OR Master's Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
CERTIFICATIONS: (One or more desired)
One or more of the following Certification(s): CISSP, CISA, CISM, GIAC, RHCE.
Hope you are doing great.
InfiCare has been providing Contingent Staffing and Direct Hire staffing services to its clients across the US and in four continents Since 2001. Starting from a modest beginning in 2001, today we service clients ranging from Fortune 500 companies to medium sized businesses as well as small niche firms. In US we are based at Dulles, VA. We are hiring “Cyber Threat Analyst II at Morrisville NC” for one of our clients. If you are interested in this position, you can revert to my email or call me at 703-652-5162.
Request ID: 42931-1
Duration: 1 Yr.
Location work will be performed: Morrisville NC
Job Title: Cyber Threat Analyst II
Description
Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces finds to help initialize or support law enforcement and counterintelligence investigations or activities.
Details
- Identify and develop threat signatures from all available sources
- Maintain threat indicators within the threat intelligence platform
- Implement and support standard procedures for incident response
- Interface with Business Unit Information System Security Officers and Incident Response Teams
- Implement a dynamic, advanced Risk-Based Alerting (RBA) security framework within Splunk
- Create and test detections written in advanced Splunk Programming Language (SPL)
- Perform analysis on hosts running on a variety of platforms and operating systems, to include, Microsoft Windows & Linux.
- Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system logs) to identify possible threats to network security.
- Leverage tools including Splunk, Tanium, Firepower, Azure, GoogleCloud, SentinelOne, SESC suite as part of duties performing cyber incident response analysis.
- Act as an observer to Red Team penetration testing exercises and collaborating with Cybersecurity Operations Center (CSOC)
- Correlate event or incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
- Work with a diverse team of analysts in conducting incident triage, incident handling, and remediation.
3-5 years of experience with security operations and incident response
Education
Bachelor's OR Master's Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
CERTIFICATIONS: (One or more desired)
One or more of the following Certification(s): CISSP, CISA, CISM, GIAC, RHCE.
Sr. Analyst Threat Preparedness and Response
Lensa -
Raleigh, NC
Threat Hunting Analyst (TS/SCI)
Cisco Systems, Inc. -
Raleigh, NC
Threat Hunting Analyst (TS/SCI)
Cisco -
Raleigh, NC