Threat Analyst | Remote, USA
Kansas, United States
Optiv
Optiv manages cyber risk so you can secure your full potential. Cybersecurity advisory services and solutions. Powered by the best minds in cyber.The Threat Analyst will provide Second Shift intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. The Threat Analyst is required to be flexible and adapt to change quickly. The Threat Analyst will work closely with our Technology Analysts and Architects to service customers.
How you'll make an impact:
Analyze, document and report on potential security incidents identified in customer environments
Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets
Act as a coordinator for security events that require urgent response, containment and remediation
Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
Perform knowledge transfers, document and train clients regarding mitigation of identified threats
Provide ongoing recommendations to other MSS peers and customers on tuning and best practices
Actively research current threats and attack vectors being exploited in the wild
Actively work with associate analysts and perform investigations
Development of KB's and SOP's
Performs other duties as assigned
Complies with all policies and standards
What we’re looking for:
High School Diploma or equivalent experience required
2-4 years full-time professional experience in the Information Security field required
2-4 years Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment required
2-4 years Experience working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, RemedyForce, Heat, etc.). preferred
DL NUMBER - Driver License, Valid and in State required
GCIA Upon Hire preferred
CISSP Certified Information Systems Security Professional Upon Hire preferred
HBSS Upon Hire preferred
NSA Upon Hire preferred
Certified Ethical Hacker (CEH) Upon Hire preferred
CompTIA Security+ Certification Upon Hire preferred
OSCP Upon Hire preferred
CCNA - Cisco Certified Network Technician Upon Hire preferred
CCDA - Cisco Certified Design Associate Upon Hire preferred
Certified Customer Service Associate (CCSA)-CSQI Upon Hire preferred
CCIE Upon Hire preferred
Microsoft Certified Systems Engineer (MCSE) Upon Hire preferred
Excellent time management, reporting, and communication skills
Ability to generate comprehensive written reports and recommendations
Write professional emails
Coaching and training experience
Ability to quickly adapt and learn new technologies
Ability to create and deliver train the trainer sessions with the team
Previous experience as a point of escalation in a technical environment
Customer interactions and creation of executive presentations
Understanding of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV
Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem
Experience and Skills (Technical)
Queue management
Ability to manually correlate data across a variety of sources
IDS monitoring/analysis with tools such as Sourcefire and Snort
Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus
Familiarity with web-based attacks and the OWASP Top 10 at a minimum
Attack vectors and exploitation
Mitigation
Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks
Familiarity with SANS top 20 critical security controls
Understand the foundations of enterprise Windows security including:
Active Directory
Windows security architecture and terminology
Privilege escalation techniques
Common mitigation controls and system hardening
Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS)
Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos or Trend Micro
Ability to identify common false positives and make suggestions on tuning
Malware
Propagation of malware in enterprise environments
Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
Familiarity with concepts associated with Advanced Persistent Threats and "targeted malware"
Experience with malware protection tools such as FireEye a plus.
Understanding of malware mitigation controls in an enterprise environment.
Network Based Attacks / System Based Attacks
Denial of Service Attacks
HTTP Based DoS Attacks
Network Based DoS Attacks
Brute force attacks
Covert channels, egress, and data exfiltration techniques
Familiarity with vulnerability scoring systems such as CVSS
Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks
10% • Ability to travel up to ten percent of the time
What you can expect from Optiv
- A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.
- Work/life balance
- Professional training resources
- Creative problem-solving and the ability to tackle unique, complex projects
- Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
- The ability and technology necessary to productively work remotely/from home (where applicable)
EEO Statement
Optiv is an equal opportunity employer (EEO). All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, status as an individual with a disability, veteran status, or any other basis protected by federal, state, or local law.
Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory ArcSight CCIE CEH CISSP CompTIA CVSS Exploit Exploits Firewalls GCIA IDS Intrusion detection Intrusion prevention LogRhythm Malware Monitoring OSCP OWASP Privacy QRadar SANS Scripting SIEM Snort SOC Sourcefire Splunk SQL SQL injection Travel Vulnerabilities Windows XSS
Perks/benefits: Career development Flex hours Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.