Information Security Analyst
- Contract
Company Description
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
Job Title: Information Security Operations Center - Incident Handler III
Location: Washington, DC
Duration: 12+ Months
Job Description:
Essential Job Functions:
• Monitor Security Events from IDS, SIEM, etc.
• Log tickets to the Ticketing System
• Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members
• Perform triage on alerts from all sources including Monitored Email Distribution Lists
• Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
• Produce ad hoc reports and other ad hoc tasks
Qualifications
Required Skills/Abilities:
• Monitoring skills related to IDS and SIEM
• Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
• Understanding of Windows Registry, File system, etc.
• Hands-on knowledge of Network Packet Analysis using tools
• Ability to work with team members with varying levels of technical skills and diverse international backgrounds
• Strong understanding of Networking and Operating systems concepts
• Ability to adapt to and function in a project environment with multiple timetables and changing priorities
• Ability to learn new concepts and approaches in Analyzing Security Incidents.
• Good communication skills (Verbal and Written)
Educational Qualifications and Experience:
• Education: Bachelor's degree in Computer Science or Information Systems
• Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
• Experience with Firewalls and information security technologies
• Experience with CERT/CSIRT/CIRT/SOC
Certification Requirements:
Any two certifications would be a plus.
CEH, Security +, CCNA
Response activities, including containment, remediation, and root cause analysis
Bachelor's degree and 5+ years of information security experience
Experience in malware remediation and containments
Hands on experience of Incident Response /Malware analysis
Essential Job Functions:
§ Perform advanced Malware Analysis, along with Incident Response
§ Generate detailed Malware Analysis reports on PE and other common file structure samples
§ Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis
§ Assist OIS in Identifying zero-day/vulnerable applications and impact
Experience Matrix for Levels:
• Level I - 2+ years of experience
• Level II - 5+ years of experience
• Level III - 7+ years of experience
Note:
The specific shift he wants to get covered is the 12pm-8pm EST window
Strong experience in SOC environment and great soft skills/customer service
Required people who can come for an in-person interview
Additional Information
For more information, Please contact
Siva Kumar
973-507-7543