Skip to main content

This job has expired

You will need to login before you can apply for a job.

Network Security Analyst 1

Employer
Five Cubes Inc
Location
Austin
Salary
Competitive
Closing date
27 May 2024

View more

Sector
IT
Job Role
Network Security
Job Type
Permanent
Job Title: Network Security Analyst 1

Location: Austin, TX

Duration: 6+ months

Direct Client

Job Description:

A network security analyst ensures that information systems and computer networks are secure. This includes protecting the company against hackers and cyber–attacks, as well as monitoring network traffic and server logs for activity that seems unusual. Additionally, these analysts are responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities. The network security analyst investigates security breaches, develops strategies for any security issues that arise, and utilizes the help of firewalls and antivirus software to maintain security.

Required Skills:

3 years' experience Required Utilize EDR/XDR platforms, including NetWitness, SentinelOne, Microsoft Defender for Endpoint, and related products, to correlate data from various network and security tools across the HHSC network.

3 years' experience Required Research, document, and present threat hunting research on cyber threat actors specifically targeting HHSC business operations, information networks, and data.

3 years' experience Required Leverage cyber threat hunting frameworks including PEAK, Sqrrl, and TaHiTI, to develop threat hunting hypotheses, determine scope, ensure repeatable processes, define outputs, and measure success in malicious behaviors detected, vulnerabilities Client.

3 years' experience Required Employ threat modeling methodologies such as STRIDE, TRIKE, MITRE Telecommunication&CK, and PASTA, to identify potential vulnerabilities, attack vectors, and threat actors specifically targeting HHSC networks, data, and users.

3 years' experience Required Develop, maintain, and update HHSC threat hunting program documentation, including policies, SOPs, and playbooks, in accordance with industry, DIR, and HHSC guidelines and documentation standards.

3 years' experience Required CTI analyst experience within a security operations center (SOC), providing support to internal cybersecurity Incident Response teams or external cybersecurity engagements on managed security services (Client) teams in large–scale organizations.

Preferred Skills:

5 years' experience Preferred Experience with dynamic and static malware analysis tools and techniques, such as Trellix, IDA Pro, and Ghidra, as well as open–source tools such as Wireshark, VirusTotal, Hybrid Analysis, and Joe Sandbox.

5 years' experience Preferred OSINT analyst experienced in utilizing brand and dark web intelligence tools such as Palo Alto XPANSE, Flashpoint, Recorded Future Intelligence Cloud, or Digital Shadows SearchLight.

5 years' experience Preferred Utilize industry research, team meetings, collaboration with HHSC IT and business units, in–depth understanding of HHSC's strategic objectives, and candidate's experience with NetWitness, SentinelOne, and Microsoft Defender for Endpoint.

5 years' experience Preferred Perform scheduled and ad–hoc meetings with relevant software and other technical vendors such as NetWitness, SentinelOne, and Microsoft, to provide feedback on current EDR/XDR usage, performance, and utilization criteria.

5 years' experience Preferred Troubleshoot, research, and resolve systemic issues in EDR/XDR tools, including NetWitness, SentinelOne, and Microsoft Defender for Endpoint, providing short–, medium– and long–term solutions to improve and maintain desired performance levels.

5 years' experience Preferred Assist in data parsing and normalization in NetWitness, SentinelOne, and Microsoft Defender for Endpoint on data streams both existing and new, leveraging advanced knowledge of scripting languages like Python and PowerShell.

5 years' experience Preferred One or more of the following certifications: NetWitness Analyst, SentinelOne IR Engineer, Microsoft Security Operations Analyst Associate, GCTI, GCFA, GREM, GCIH, GDAT.

Benefits:

Rate: $53.33 to $ 63.33 /Hr DOE

Onsite Role.

Required to be within the state of Texas

GC and USC candidate only

Get job alerts

Create a job alert and receive personalised job recommendations straight to your inbox.

Create alert