Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Information Security Analyst Jobs
Recruited by Saltex Group Security Solutions 9 months ago Address Miami, FL, United States
Information Systems Security Officer
Recruited by Booz Allen Hamilton 9 months ago Address , Fort Walton Beach, Fl $58,300 - $133,000 a year
Information Security Analyst Jobs
Recruited by Jobot 11 months ago Address Charlotte, NC, United States
Information Security Intern Jobs
Recruited by Enpro 1 year ago Address Charlotte, NC, United States
Information Security Specialist Jobs
Recruited by StevenDouglas 1 year ago Address Miramar, FL, United States
Information Security Analyst (Contract)
Recruited by Wells Fargo 1 year ago Address , Charlotte, Nc
Information Security Professional Ii
Recruited by University of Central Florida 1 year ago Address , Orlando, 32816, Fl $64,518 - $88,713 a year

Junior Information Security Analyst

Company

Patterned Learning AI

Address Miami, FL, United States
Employment type FULL_TIME
Salary
Category IT Services and IT Consulting
Expires 2023-12-07
Posted at 11 months ago
Job Description
REMOTE (US/Canada Residing people only, with work permit) Patterned Learning –Junior Information Security Analyst), FULL-TIME, Salary $70K - $80K a year & minimum 1 years of work experience.


About us: The Future of AI is Patterned, a stealth-mode technology startup. Top investors include Sequoia and Anderson Horowitz, founders from Google, DeepMind, and NASA and we’re hiring for almost everything!



  • To improve the security of products and solutions by design, in use and through partnership. This role will focus on Integrated Supply Chain and Manufacturing Operational Technology (OT).
  • This entry level person should have a technical understanding of enterprise IT and OT environments. They should have experience investigating complex technical security incidents.
  • You will leverage a broad array of investigative information, including log data, to identify and investigate potential security incidents.


Essential Job Functions;


  • Perform host-based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response.
  • Develop content and action tuning requests to improve alert fidelity and reduce false positives
  • Develop program metrics and reporting, compile and analyze data for accurately timely reporting of activity
  • Strong understanding of security principles such as attack frameworks, threat landscapes, attacker/APT TTPs, etc.
  • The following duties and responsibilities are intended to be representative of the work performed by the incumbent(s) in this position and are not all-inclusive. The omission of a specific duty or responsibility will not preclude it from the position.
  • Recommend detection and prevention/mitigation signatures and actions as part of a layered defensive strategy leveraging multiple capabilities and data types.
  • Ensure all incidents are supported with evidence and artifacts derived from analysis. Provide clear and actionable event notifications
  • Assist with additional projects as needed
  • Proactively hunt by performing analysis of events in the current SIEM and other SOC tools looking for malicious activity and other security related events that were not identified by the automated processes.
  • Operate within direction to investigate and escalate in accordance with protocols
  • You will help identify advanced anomaly detection strategies and instrument systems to automate detections
  • Active participation in 24x7 operations of the BD Security Operations Center. This includes proactively monitoring and providing cybersecurity status and reports to enable timely decision-making
  • Provide direction to managed service provider to triage alerts, collect related data from various network analysis systems, review available open and closed source information on related threats & vulnerabilities, diagnose observed activity for likelihood of system infection, compromise or unintended/high-risk exposure.


Basic Qualifications;


  • Excellent analytical and problem-solving skills
  • In-depth knowledge of Windows operating systems, other OS’s such as Linux is a plus
  • Previous experience in Network monitoring platforms
  • In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
  • Preferred Certifications: CISSP, GCIH, GCTI, CCTHP etc.
  • Proven ability to act independently and to execute with limited information and ambiguity


Education & Experience;


  • Demonstrated ability to contribute to a continuous learning and process improvement environment
  • Detail-oriented with the ability to promptly assess logs for accuracy as well as consistency
  • Ability to work in a team environment
  • Strong interpersonal skills with the ability to influence others in a positive and effective manner
  • Excellent communication skills; both oral and written
  • Experience in Security Operations Center is desired
  • Associate’s or Bachelor’s Degree in a relevant field or equal level of experience


Special Benefits You Will Love


  • Health, vision, and dental insurance
  • 401(k) with up to 2% employer match
  • Flexible vacation, paid holidays, and paid sick days


Schedule: 8 hour shift, Monday to Friday , Time: Flexible, Job Type: Full-time