Cybersecurity Analyst

North Carolina - Virtual Employee, United States

Apply now Apply later

More than a career - a chance to make a difference in people's lives.

Build an exciting, rewarding career with us – help us make a difference for millions of people every day. Consider joining the Duke Energy team, where you'll find a friendly work environment, opportunities for growth and development, recognition for your work, and competitive pay and benefits.

Job Summary

The Cybersecurity Operations Center Analyst is responsible for the support, maintenance and development of tools utilized to generate cyber security events and incidents across the Duke Energy environment. The Analyst will work closely with peers, other internal/external teams and management in a 24x7 Cybersecurity Operations Center (CSOC) environment. The Analyst is also responsible for following processes and procedures as defined by Cybersecurity leadership and the Computer Incident Response Team (CIRT). They will typically perform in a role similar to systems administrator with a focus on detection and correlation of cyber events related to managed systems. 

Responsibilities

  • Conduct network, endpoint, cloud network, and log analysis by utilizing various consoles on a regular basis to analyze and triage cybersecurity events (e.g., SIEM, IPS, firewall, etc.) and perform continuous hunt across the environment. Reconstruct cyber events, assess cyber threat and scope of impact, identify and track any internal lateral or external movement, and develop response solutions. Research and track new exploits and cyber threats, particularly as it relates to the cloud environment and containers.

  • Interact with security community, and government agencies to obtain technical cyber threat intelligence. Track cyber threat actors/campaigns based off technical analysis and open source/third party intelligence.

  • Research and track new exploits and cyber threats.

  • Assists with containment of threats and remediation of environment during or after an incident

  • Conduct cursory and/or in-depth analysis (i.e. packet captures, endpoint behaviors, etc.), or collaborate with peers when appropriate for hand-offs/escalations.

  • Conduct analysis of malicious code and weaponized documents through behavioral analysis or reverse engineering.

  • Request and track mitigations to address cyber threats and lead other incident response coordination and remediation activities. Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs.

  • Enhance and tune detections and alerts and other cyber event correlation rules to reduce false positives. Provide creative and innovative solutions to automate and enhance processes and capabilities

  • Provide 24x7 operational support for escalations on a rotating shift basis

Basic/Required Qualifications

  • Bachelors degree in Managing Information Strategies (MIS), Computer Science, or Cybersecurity

  • Minimum 2 Years of Required Related Experience

  • In lieu of Bachelors degree AND 2 years related work experience listed above, High School/GED AND 6 year(s) related work experience

Desired Qualifications

  • Experience in Cybersecurity, preferably with SIEM technology, event logging and detection mechanisms. Knowledge of foundational computer elements from the operating system, memory and BIOS to TCP/IP, routing and network topology. 

  • 2+ years experience in a security operations center and/or system administration role 

  • Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings and provide briefings to various levels of staff / management.

  • Demonstrated effective oral and written communication skills

  • Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

  • Team player, works well with others

  • Direct background or exposure to cyber security operations

  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

  • Windows and UNIX/Linux command line scripting experience and programming experience.

  • Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).

  • Familiarity or experience with the Cyber Kill Chain® methodology & MITRE's ATT&CK Framework®

  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

  • Innovative – ability to recognize and seek improvement and efficiency opportunities

  • Demonstrated commitment to training, self-study and maintaining proficiency in the technical cyber security domain. "

Working Conditions

  • Hybrid Mobility Classification – Work will be performed from both remote and onsite locations after the onboarding period. However, hybrid employees should live within a reasonable daily commute to a Duke Energy facility.

  • Office Environment

#LI-ZM1

Travel Requirements

Not required

Relocation Assistance Provided (as applicable)

No

Represented/Union Position

No

Visa Sponsored Position

No

Posting Expiration Date

Tuesday, February 11, 2025

All job postings expire at 12:01 AM on the posting expiration date.

Please note that in order to be considered for this position, you must possess all of the basic/required qualifications.

Privacy

Do Not Sell My Personal Information (CA)

Terms of Use

Accessibility

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Analyst Jobs

Tags: Application security Cloud Computer Science CSOC Cyber Kill Chain Exploits Firewalls Incident response IPS ITIL KPIs Linux Log analysis Open Source Privacy Reverse engineering Scripting SIEM SOC SQL TCP/IP Threat intelligence TTPs UNIX Vulnerabilities Windows XSS

Perks/benefits: Career development Competitive pay Relocation support Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.