Information Security Analyst

McLean, VA, United States

Applications have closed

Arthur Grand Technologies Inc

federal contracting opportunities, federal contracting, federal contracting companies, federal contracting for small business, federal contracting agencies, us federal contracting corp, federal contracting services, federal contracting...

View company page

Company Description

Arthur Grand (AG) is an IT services firm specializing in Digital Transformation initiatives for Federal, Commercial, State & local customers. Since 2012, AG has (been) successfully supporting and delivering IT services to our customers in the areas of enterprise modernization and transformation with a core focus on emerging technologies including Cloud Solutions (AWS, Azure), Agile Development and Custom Programming, Full Stack Development, DevOps, DevSecOps, & CI/CD, Web & Mobile APP Development, Data Visualization and Data Warehousing, Financial/ERP System Implementation, Infrastructure Management. Arthur Grand’s culture of (delivery excellence) or excellent delivery, combined with a commitment to bring the best talent to provide services, has earned our company an unparalleled reputation for delivering transformative results.

Job Description

Role: Information Security Analyst

Location: Mclean, VA (Day one onsite)

Duration: Fulltime

 

Security Event Monitoring

  • Responsible for monitoring Security events from SIEM, Threat Intelligence, end use notifications, etc to determine security risk and respond accordingly.
  • Follow established processes, procedures & SLAs to respond and to document analysis of security events.
  • Participate in various tasks within the SOC (SIEM, Mailbox monitoring, Threat Intel, etc)
  • Responsible for development/improvement of processes/procedures related to Cyber Security Operation Center.
  • Review existing alerts, identify opportunities for tuning and work with Content development team to test and implement them.
  • Provide guidance to junior analysts on all SOC activities
  • Participate in review of new SIEM use cases and develop runbooks that provide guidelines for analyzing specific threats related to the new use cases.

Collaboration

  • Coordinate response, triage and escalation of security events affecting the company’s information assets and activities with the Incident Response team.
  • Coordinate with Forensics Team for analysis of malware samples, obtain IOCs and implement necessary preventive measures.

Align with Industry best practices

  • Review new Threats, determine need for relevant Security use cases and work closely with Threat detection team to implement them.
  • Evaluate use cases on a periodic basis to ensure that they are still relevant, support monitoring of security risks, have the right data sources and are providing value.
  • Review existing runbooks to determine if they capture the requirements, how SIEM correlates the events, frequency of job execution and generic guidelines that provide analysts a comprehensive understanding of security use cases and how to address them.

Qualifications

  • 5+ years of Information Security or related risk management experience
  • 2+ years of Hands-on Information Security SOC/Incident Response experience with analyzing IOCs/Alerts as identified by CSOC & Threat Intel team
  • Demonstrated experience with SIEM use cases and runbook development
  • Demonstrated experience in handling security events in mission critical environments
  • Strong knowledge of enterprise detection technologies and processes (Advanced Threat Detection Tools, SIEM, UBA, DLP, IDS/IPS, EDR, NDR, Network Packet Analysis, etc.).
  • Advanced knowledge of network protocols and operation systems (Windows Unix, Linux)
  • Strong knowledge of cloud environments with at least a year of demonstrated experience on one of the cloud platforms
  • Bachelor’s degree in Information Security, Computer Science, Information Technology, related field, or equivalent work experience
  • Relevant security knowledge and experience in two of the following areas: security operations, incident response, network/host intrusion detection, threat response.
  • Ability to communicate clearly and effectively

Preferred Skills

  • CySA+, GCIA, GCIH, CISSP certifications
  • Tool Specific Certs such as: Splunk, CrowdStrike, Microsoft, AWS, GCP, Azure, etc.
  • Threat Hunting experience

Experience in the financial services industry

Additional Information

All your information will be kept confidential according to EEO guidelines.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Agile AWS Azure CI/CD CISSP Cloud Computer Science CrowdStrike CSOC DevOps DevSecOps EDR ERP Forensics Full stack GCIA GCIH GCP IDS Incident response Intrusion detection IPS Linux Malware Monitoring Risk management SIEM SLAs SOC Splunk Threat detection Threat intelligence UNIX Windows

Perks/benefits: Team events

Region: North America
Country: United States
Job stats:  14  2  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.