Information Security Engineer IV

Genesys Talent (Vendor) - Centennial, CO (30+ days ago)


Position Description:

MUST be a US Citizen or a Green Card Holder.

6-Month Contract

The Tier 3 Managed SOC Analyst’s primary function is to provide managed security operations center (SOC) analysis associated with customer monitoring activities through the processing and management of incident and request tickets, as they are assigned. Deeper dives into threat hunting are also in scope. The responsibilities include receiving and managing escalations from Tier 1 or 2 Analysts, customers, and other internal groups, as well as managing the full incident handling lifecycle with customers. The Tier 3 Analyst is expected to contribute to internal documentation and adherence to SLA targets and requirements. The role includes forensic log root cause analysis, and interfacing with clients and associates as needed to resolve complex cases. Tier 3 Analysts are expected to participate in, and contribute to planning and implementation of strategic and operational projects in efforts to achieve overall MSS goals. Tier 3 analysts are expected to be able to troubleshoot complex problems with little oversight, take ownership and work independently as needed to resolve customer issues.

Duties and Responsibilities:

  • Maintain Industry Training – This involves keeping up-to-date on security technologies, threats, and risk mitigation techniques
  • Maintain Knowledge of Current Threats – Keep up-to-date on current threats by regularly reading industry-related articles
  • Case Management – ensuring the case management process is handled efficiently in a timely manner by all SOC personnel.
  • SOC Activity Log –creating, reviewing, and maintaining entries , working with other analysts Report Creation – creating temporary or permanent reports for customers, as requested.
  • Customer Meetings – attending and/or leading customer meetings as part of incident response and incident handling
  • Training and Mentoring SOC personnel – Security Analysts are responsible for training new SOC employees; also responsible for training and mentoring existing SOC personnel on new technologies implemented by CenturyLink; also responsible for retraining SOC personnel, if necessary
  • Tuning – regularly performing tuning and filtering SIEM alerts and monitoring components to ensure only relevant security data is gathered
  • System Maintenance – assisting SOC Engineers with maintenance on security devices, as needed
  • Projects - May lead moderately complex security projects as assigned

Shift Responsibilities:

  • The Security Analyst is responsible for the following shift duties:
  • Daily Traffic Review – replaying traffic from previous shifts and reviewing customer reports to ensure potential security incidents were not missed by a Level 1 Analyst.
  • Report Run Verification – ensure customer reports run as scheduled
  • Improve their knowledge of the customer environment, intrusion detection, methodologies, and intrusion detection services with the support of on-going training from the analysts and self-study
  • Review SOC Activity log, cases and other monitoring tools for complete understanding of previous shift activities and incidents
  • Handle Tier 2 event incident response, case management, and customer notification
  • Ensure security devices contain up-to-date signatures libraries
  • Assist with engineering tasks as necessary
  • Train SOC Level 1 Analysts on new attack signatures and attack methodologies
  • Providing process and operational improvement suggestions
  • Review and update documentation (such as SOPs and TTPs)
  • Complete vendor training as requested by Management
  • Subscribe to and review security mailing lists such as ISC SANS (isc.sans.edu)
  • View the Internet Storm Center on a daily basis for up-to-date news on recent Internet activity of note (http://isc.incidents.org)
  • Daily Case Management – the Security Analyst will review open cases and provide follow up that may be required

Qualifications:

  • U.S. Based
  • 5+ years of Information Security experience
  • 5+ years Firewall management and rules analysis
  • 2-4 years of systems analysis
  • Working knowledge of Linux and syslog from CLI
  • Proven ability and past experience performing moderately complex security analysis for information technology is required
  • Excellent writing and communications skills
  • Familiarization with a variety of information and network security monitoring tools (ArcSight SIEM, QRadar SIEM, Splunk, Arbor DDoS Mitigation, Cisco IDS/IPS, Netcool, and Imperva WAF, among others)
  • Ability to work in a dynamic team-centered environment

Education Preferred:

  • Bachelor’s Degree in Computer Information Systems or related field

Industry Certifications:

  • Tier 3 Analysts should possess the background and experience necessary to obtain Industry or SOC specific certifications as instructed by management. Possible applicable certifications include, but are not limited to:
  • Certified Information Systems Security Professional (CISSP)
  • Information Systems Security Engineering Professional (CISSP-ISSEP)
  • Systems Security Certified Practitioner (SSCP)
  • CompTIA Security+
  • Certified Ethical Hacker (CEH)
  • Certified Security Analyst (ECSA)
  • Certified Incident Handler (ECIH)
  • CompTIA Cybersecurity Analyst (CSA+)
  • Information Technology Infrastructure Library (ITIL)
  • Cisco CCNA
  • Cisco CCNP + Security
  • GSEC
  • GCIH
  • GCIA
  • MCSE
  • Linux+

Work Experience:

  • 2-3 years of Managed Security Service Provider Tier-1/2 Analyst/Operator Experience (Preferred)
  • 3-4 years of SOC or NOSC analyst experience
  • Threat Intelligence or Forensic background is a plus

Job Type: Contract

Experience:

  • Information Security: 5 years (Preferred)
  • Security: 5 years (Required)

Work authorization:

  • United States (Preferred)