Tier 2 Helpdesk Analyst Jobs
By Sira Consulting, an Inc 5000 company At Washington DC-Baltimore Area, United States
Hands-on experience with a wide range of infrastructure, including but not limited to Operating Systems, Device Management, and client systems
Experience in working with a ticketing system, such as Service Manager, ServiceNow, Remedy. Etc.
Experience with trouble ticketing system—currently using Service Manager
Respond to and resolve inbound computer-related end user support tickets in a timely manner using Service Manager.
Must have min. of 8 years’ experience with Windows 10 and in Active Directory Environment.
Advanced level experience in MAC/PC hybrid environments including mobile devices.
Soc Analyst Tier 1/2 Jobs
By Softworld, a Kelly Company At Reston, VA, United States

Job Number: 240479 SOC Analyst Tier 1/2 Job Description We are looking for Security Operations Analyst - Digital. I.e. Digital Forensics, Packet Capture, Malware, Incident Response. We ...

Soc Analyst Tier 2 Jobs
By Leidos At United States
Must have experience in incident management and responding to network anomalies.
Incident Management: Review network traffic escalated by Tier 1 analysts and respond to or escalate to Tier 3.
Collaboration: Continuously share knowledge and contribute to improvement of SOC tools and processes.
Vulnerabilities: Assist in the remediation of vulnerabilities and threats to the network.
2-4 years of experience in cybersecurity or a Masters degree with less than 2 years experience
Value candidates who have threat hunting experience.
Incident Manager 2 Jobs
By ARSIEM Corporation At Arlington, VA, United States
BS Incident Management, Operations Management, Cybersecurity or related degree. HS Diploma with 4-6 years of incident management or cyber security experience
2+ years of directly relevant experience in cyber incident management or cybersecurity operations
Skill in recognizing and categorizing types of vulnerabilities and associated attacks
Knowledge of incident response and handling methodologies
Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident
Knowledge of basic system administration and operating system hardening techniques
Incident Response Analyst Jobs
By Foregenix At United States
Offer support to the Digital Forensics team during investigations (as required), while embracing the opportunity to learn from highly experienced investigators
A minimum of3 years’ experience in a network/security related IT Role
Solid knowledge of both Windows and Linux based systems at an operational level
Reverse engineering skills a definite positive
SOC or NOC experience advantageous
Responsible for reviewing and monitoring client system security status on an ongoing basis
Tier 2 Security Event Monitoring Analyst
By Deloitte At , Rosslyn, 22209, Va
When necessary, and with the Manager's approval, devise and document new procedures Operational
Minimum of 2 years of combined experience in the Information Security / Cybersecurity domain with a focus on security event monitoring
Proven track record and experience of the following in a highly complex and global organization:
Professional security certification preferred, such as Certified Intrusion Analyst (GIAC), CISSP, Certified Ethical Hacker (CEH), Certified Expert Penetration Tester (CEPT)
Willing to work on any of three 10 hour shifts to offer 24 hours support service
Understanding of network devices such as routers, switches. TCP/IP knowledge
Incident Response Analyst Jobs
By CyberProof At Georgia, United States
- Evaluate alert/incident response requirements from stakeholders and determine the feasibility of response goals.
- Minimum of 5 years of experience in Information Security.
- In-depth operational experience with SIEM technologies.
- Minimum 2 years' experience in the playbook and IR response development.
- Penetration Testing experience or Security Assessment consulting.
- Excellent interpersonal and Analytical Skills to work effectively as a team player.
Tier 2 Soc Analyst Jobs
By Zeneth Technology Partners At , Mclean, 22102, Va
Project management experience to help build tiger teams for special projects
Perform Security Incident Management aligned with NIST standards.
Develop processes that analyze data and produce accurate, meaningful, easily interpreted results based on user requirements and use cases.
Create custom tool content to enhance capabilities of security operations teams.
Manage the collection, documentation and research of security events generated by the SOC monitoring platform and infrastructure.
Bachelors’ degree in Computer Science, Information Technology or related technical field. Additional years of experience can be substituted for a degree.
Tier 2 Security Event Monitoring Analyst
By Deloitte At , Mclean, Va
When necessary, and with the Manager's approval, devise and document new procedures Operational
Minimum of 2 years of combined experience in the Information Security / Cybersecurity domain with a focus on security event monitoring
Proven track record and experience of the following in a highly complex and global organization:
Professional security certification preferred, such as Certified Intrusion Analyst (GIAC), CISSP, Certified Ethical Hacker (CEH), Certified Expert Penetration Tester (CEPT)
Willing to work on any of three 10 hour shifts to offer 24 hours support service
Understanding of network devices such as routers, switches. TCP/IP knowledge
Incident Response Analyst Jobs
By PayPal At , Scottsdale, Az $60,900 - $147,400 a year
Minimum 3-5 years of experience as a SOC analyst
Experience with troubleshooting and configuring networking devices, application platforms, and database, Windows and UNIX system administration
Analyze network traffic, endpoint indicators, and various log sources to identify the threat, assess the potential damage, and recommend countermeasures,
Propose additional components and techniques that could be used to proactively detect malicious activity
Recommend configuration changes to improve the performance, usability, and value of threat analysis tools
Communicate with all levels of technology and operational staff, assist in creation and follow methodologies, creating clear, concise deliverables
Incident Response Analyst Jobs
By AnChain.AI At San Francisco Bay Area, United States
2+ years of incident analysis, malware research, SOC, or any other similar incident response experience.
1+ years' experience working at the security team at cryptocurrency exchanges with hands-on incident response experience.
2+ years' experience working at Tier 1 cybersecurity companies: Mandiant (Google Cloud), FireEye, Palo Alto Networks, Crowdstrike, ZScaler, etc.
3+ years’ experience with purple or blue teaming, or SOC experience
Provide expert level knowledge of tools and technologies used for enterprise security
Cyber security relevant certifications (Security+, CEH, GIAC GCIA, GCIH, CISSP, etc.)
Project Analyst 2 Jobs
By Testing Company Job Posting 407 At Johnston, RI, United States

Title: Project Analyst 2 Location: Johnston, RI Pay Rate : $41.80/hr Duration of Assignment: currently 5 month, could go longer About Job : Responsible for providing project support to IT ...

Tier 2 Security Event Monitoring Analyst
By Deloitte At , Arlington, Va
When necessary, and with the Manager's approval, devise and document new procedures Operational
Minimum of 2 years of combined experience in the Information Security / Cybersecurity domain with a focus on security event monitoring
Proven track record and experience of the following in a highly complex and global organization:
Professional security certification preferred, such as Certified Intrusion Analyst (GIAC), CISSP, Certified Ethical Hacker (CEH), Certified Expert Penetration Tester (CEPT)
Willing to work on any of three 10 hour shifts to offer 24 hours support service
Understanding of network devices such as routers, switches. TCP/IP knowledge
Tier 2 Security Operations Center (Soc) Analyst
By Binary Defense At , Remote
Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
3+ years experience working within a security operations center.
3+ years experience working across multiple security disciplines (DFIR, log analysis, packet analysis, etc.)
1-2 years of leadership experience within a SOC environment.
Experience working within 1 or more SOAR platforms preferred.
Two or more of the following certifications: CISSP, GCIH, GCIA, GCDA, GMON
Incident Response Analyst Jobs
By TikTok At , San Jose, Ca $90,000 - $133,000 a year
Strong Operating System Administration skills, including conceptual knowledge of OS internals and experience with core service types
At least 1-3 years of experience handling security related incidents.
Experience in computer security incident handling
Excellent analytical and problem-solving skills
Excellent communication skills (verbal and written), teamwork and collaboration skills
Conduct technical analysis and assessments of security-related incidents, including malware analysis, packet-level analysis, and system-level forensic analysis

Are you looking for an exciting opportunity to join a world-class Incident Response team? We are looking for a Tier 2 Incident Response Analyst to join our team and help protect our customers from cyber threats. You will be responsible for responding to and investigating security incidents, analyzing security logs, and providing recommendations for remediation. If you have a passion for security and a drive to protect our customers, this is the job for you!

Overview A Tier 2 Incident Response Analyst is responsible for responding to and resolving security incidents. They are responsible for identifying, analyzing, and responding to security threats and vulnerabilities. They must have a strong understanding of security principles, technologies, and processes. Detailed Job Description The Tier 2 Incident Response Analyst is responsible for responding to and resolving security incidents. They will be responsible for identifying, analyzing, and responding to security threats and vulnerabilities. They must have a strong understanding of security principles, technologies, and processes. They will be responsible for monitoring security systems, analyzing security logs, and responding to security incidents. They will also be responsible for developing and implementing security policies and procedures. Job Skills Required
• Knowledge of security principles, technologies, and processes
• Knowledge of security systems and tools
• Knowledge of security incident response processes
• Ability to analyze security logs and identify security threats
• Ability to develop and implement security policies and procedures
• Ability to communicate effectively with technical and non-technical personnel
• Ability to work independently and as part of a team
Job Qualifications
• Bachelor’s degree in Computer Science, Information Technology, or related field
• 5+ years of experience in security incident response
• Experience with security systems and tools
• Experience with security incident response processes
• Certification in security incident response (CISSP, CISM, etc.)
Job Knowledge
• Knowledge of security principles, technologies, and processes
• Knowledge of security systems and tools
• Knowledge of security incident response processes
• Knowledge of security policies and procedures
Job Experience
• 5+ years of experience in security incident response
• Experience with security systems and tools
• Experience with security incident response processes
Job Responsibilities
• Monitor security systems and analyze security logs
• Respond to security incidents and investigate security threats
• Develop and implement security policies and procedures
• Communicate effectively with technical and non-technical personnel
• Work independently and as part of a team