Security Event Monitoring Tier 1 Analyst
By Deloitte At , Arlington
Fundamental understanding and/or working experience with different attack vectors such as malware, phishing, social engineering, or vulnerability exploitation
Fundamental understanding and/or working experience with Active Directory, Windows, or Linux system administration
Fundamental understanding and/or working experience with network services and devices, the OSI model, and TCP/IP protocols
Excellent written, verbal, interpersonal, and collaborative skills
Up-to-date knowledge on current cybersecurity news and trends
Scripting experience (JavaScript, PHP, PowerShell, Python)
Tier 2 Security Event Monitoring Analyst
By Deloitte At , Rosslyn, 22209, Va
When necessary, and with the Manager's approval, devise and document new procedures Operational
Minimum of 2 years of combined experience in the Information Security / Cybersecurity domain with a focus on security event monitoring
Proven track record and experience of the following in a highly complex and global organization:
Professional security certification preferred, such as Certified Intrusion Analyst (GIAC), CISSP, Certified Ethical Hacker (CEH), Certified Expert Penetration Tester (CEPT)
Willing to work on any of three 10 hour shifts to offer 24 hours support service
Understanding of network devices such as routers, switches. TCP/IP knowledge
Security Analyst 2 Jobs
By Oracle At ,
Knowledge and experience of security testing tools
Develop new skills and competencies working with our vast cloud product offerings
Good understanding of application security, CVE classification system (Common Vulnerabilities and Exposures) and OWASP top 10
Ability to review vulnerabilities in open-source software written in Java and/or GoLang, C/C++, Python.
Foundational skills in Python programming
Strong analytical skills combined with good communication skills and fluent English
Tier 2 Security Event Monitoring Analyst
By Deloitte At , Mclean, Va
When necessary, and with the Manager's approval, devise and document new procedures Operational
Minimum of 2 years of combined experience in the Information Security / Cybersecurity domain with a focus on security event monitoring
Proven track record and experience of the following in a highly complex and global organization:
Professional security certification preferred, such as Certified Intrusion Analyst (GIAC), CISSP, Certified Ethical Hacker (CEH), Certified Expert Penetration Tester (CEPT)
Willing to work on any of three 10 hour shifts to offer 24 hours support service
Understanding of network devices such as routers, switches. TCP/IP knowledge
Security Analyst 2 Jobs
By Enterprise Holdings At , St. Louis, 63105, Mo
Must have strong time management and organization skills combined with attention to detail.
3+ years of experience in Information Security, including knowledge of cloud computing technology.
Ability to be flexible and adaptable to changing requirements and responsibilities and deliver high quality results.
Demonstrable aptitude for leadership, collaboration, and relationship management.
Bachelor's degree in Computer Science, Computer Information Systems, Management Information Systems, or related field preferred
Experience developing security requirements in policy or standards.
It Security Operations Center Analyst – Tier 2
By University of Utah At , Salt Lake City, 84112, Ut $47,600 - $99,500 a year
Investigate and analyze security incidents to identify threats and vulnerabilities
At least 2 years of experience in security operations or a related field
Experience with security incident investigation and response
Knowledge of SIEM solutions and other security tools
Strong problem-solving and analytical skills
Excellent written and verbal communication skills
Tier 2 Security Event Monitoring Analyst
By Deloitte At , Arlington, Va
When necessary, and with the Manager's approval, devise and document new procedures Operational
Minimum of 2 years of combined experience in the Information Security / Cybersecurity domain with a focus on security event monitoring
Proven track record and experience of the following in a highly complex and global organization:
Professional security certification preferred, such as Certified Intrusion Analyst (GIAC), CISSP, Certified Ethical Hacker (CEH), Certified Expert Penetration Tester (CEPT)
Willing to work on any of three 10 hour shifts to offer 24 hours support service
Understanding of network devices such as routers, switches. TCP/IP knowledge
Tier 2 Security Operations Center (Soc) Analyst
By Binary Defense At , Remote
Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
3+ years experience working within a security operations center.
3+ years experience working across multiple security disciplines (DFIR, log analysis, packet analysis, etc.)
1-2 years of leadership experience within a SOC environment.
Experience working within 1 or more SOAR platforms preferred.
Two or more of the following certifications: CISSP, GCIH, GCIA, GCDA, GMON
Security Manager 2 Jobs
By Northrop Grumman At , Merritt Island, Fl $95,900 - $143,900 a year
Experience with Cape Canaveral Space Force Station access control and badge issuance requirements.
Experience with Kennedy Space Center access control and badge issuance requirements.
Manage day-to-day Security operations of the facility.
Experience planning and administering Security for classified launch campaigns.
Effective verbal and written communication skills.
Strong skills in team building.
Itar Security Monitoring Analyst
By GeorgiaTEK Systems Inc. At United States
Location – remote – Must be willing to work MST / CST
3 years of experience as a cyber security analyst
Experience with the Linux command line and CLI tools for processing data
Experience with carbon black live response, and live response triage techniques
Experience creating incident response playbooks
Scripting and automation: Knowledge of scripting languages (e.g., Python, PowerShell, bash)