Apply for this job now

Cybersecurity Analyst - Incident Response, Security+, GSEC, GCIH

Location
San Pedro, California
Job Type
Permanent
Posted
15 Feb 2021
If you are a Cybersecurity Analyst with 5+yrs experience in incident response, along with a current security certification, please read on!

Top Reasons to Work with Us

--This is a 12 month contract, renewable yearly--
1099 or C2C: $45 - $90 W2: $33.00 - $75 (depending on benefits desired)
--You must be near San Pedro, CA for this contract--

What You Need for this Position
  • 5+yrs incident response
  • 5+yrs network security architecture, malware analysis, or similar
  • Demonstrated knowledge of cyber security tools.
  • One or more of the following (current) certifications
Security+
GSEC
GCIA
GCIH
CISSP

It Is a Plus If You Have
  • Tier 1 or Tier 2 Security Operations Center Analyst responsibilities
  • Experience working on security information and event management (SIEM)
  • Experience interpreting common attacks and exploits, including Denial of Service, Domain Name systems, malware infections, exploit kits, drive-by compromises, spear phishing, zero days
What You Will Be Doing
  • Ability to technically interpret security events from: firewalls, endpoint protection, intrusion prevention/detection systems, security information and events management (SIEM), proxies, advanced persistent threats, email systems, servers (physical and virtual), databases and packets
  • Ability to interpret common attacks and exploits including but not limited to: Denial of Service, Domain Name Systems, malware infections, exploit kits, drive-by compromises, spear phishing, and/or zero days
  • Ability to analyze and reverse engineer malware packages to assess threats and indicators of compromise
  • Ability to create, correlate and modify advanced SIEM use-cases to trigger notifications on all severity levels of incidents
  • Ability to develop, analyze and interpret programming of malicious codes
  • Ability to demonstrate mastery of Tier 1 and Tier 2 Security Operations Center (SOC) Analyst responsibilities
  • Ability to reliably monitor and analyze specified data sources and incidents
  • Must have technical experience and knowledge on network and systems administration
  • Ability to consistently follow incident monitoring processes and procedures
  • Ability to document and communicate incident status updates, for non-technical personnel
  • Ability to create consistent and complete incident reports
  • Responsible for monitoring escalated event alerts
  • Ability to work well under pressure be able to think outside of the box
So, if you are a Cybersecurity Analyst with 5+yrs experience in incident response, along with a current security certification, please apply today!

Email Your Resume In Word To

Looking forward to receiving your resume through our website and going over the position with you. Clicking apply is the best way to apply, but you may also:

  • Please do NOT change the email subject line in any way. You must keep the JobID: linkedin : CH- -- in the email subject line for your application to be considered.***
Colette Hory - Principal Recruiter - Optello

Applicants must be authorized to work in the U.S.

Optello is proud to be an Equal Opportunity Employer

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law.

Your Right to Work - In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.
Apply for this job now

Details

  • Job Reference: 231880428-2
  • Date Posted: 15 February 2021
  • Recruiter: Optello
  • Location: San Pedro, California
  • Salary: On Application
  • Job Type: Permanent