What are the responsibilities and job description for the Cybersecurity Analyst (Mid) position at NexThreat?
Job Title:Cybersecurity Analyst (Mid)
Location: NCR or Clarksburg
Job Category: Information Technology
Time Type: Full-time
Clearance Requirement: Current TS/SCI Clearance required
Security Suitability: Must pass FBI security suitability
Polygraph Requirement: Must pass an FBI administered Counterintelligence polygraph if one has not been conducted within the last five years.
Employee Type: W2 or 1099
Citizenship: US Citizen, no Dual Citizenship
Summary
NexThreat is seeking Cybersecurity Analyst (Mid). The Mid-Level Cybersecurity Analyst is an integral part of the Watch Floor Team within the Security Operations Center (SOC). This team operates around the clock, 24/7, 365 days a year, ensuring the timely detection and resolution of potential security incidents. By minimizing the impact of cyber threats, the team plays a crucial role in safeguarding the confidentiality, integrity, and availability of the organization's information assets. The Mid-Level Analyst is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats.
Key Responsibilities
Location: NCR or Clarksburg
Job Category: Information Technology
Time Type: Full-time
Clearance Requirement: Current TS/SCI Clearance required
Security Suitability: Must pass FBI security suitability
Polygraph Requirement: Must pass an FBI administered Counterintelligence polygraph if one has not been conducted within the last five years.
Employee Type: W2 or 1099
Citizenship: US Citizen, no Dual Citizenship
Summary
NexThreat is seeking Cybersecurity Analyst (Mid). The Mid-Level Cybersecurity Analyst is an integral part of the Watch Floor Team within the Security Operations Center (SOC). This team operates around the clock, 24/7, 365 days a year, ensuring the timely detection and resolution of potential security incidents. By minimizing the impact of cyber threats, the team plays a crucial role in safeguarding the confidentiality, integrity, and availability of the organization's information assets. The Mid-Level Analyst is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats.
Key Responsibilities
- Monitor security events and alerts using industry-standard tools to identify potential threats and vulnerabilities.
- Analyze and investigate security incidents, documenting findings and recommending remediation steps.
- Collaborate with the Watch Floor Team to ensure efficient incident detection and response.
- Assist in developing and refining incident response procedures and playbooks.
- Generate reports on security incidents, trends, and recommendations for management review.
- Participate in ongoing training and professional development to enhance cybersecurity skills and knowledge.
- Contribute to the enhancement of SOC processes, tools, and technologies to improve overall efficiency.
- Required:
- Proficiency in using Splunk Enterprise Security for monitoring and analysis of security events.
- Preferred:
- Familiarity with Microsoft Sentinel for cloud-based security operations.
- GIAC Continuous Monitoring Certification (GMON)
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Forensic Analyst (GCFA)
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Cloud Threat Detection (GCTD)
- GIAC Cloud Forensics Responder (GCFR)
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
- Relevant experience (typically 3-5 years) in cybersecurity analysis or a similar role within a SOC environment.
- Strong analytical and problem-solving skills, with the ability to prioritize tasks in a fast-paced environment.