SOC Analyst (US Citizen) - Melbourne, FL- JP6652 with Security Clearance
Altimeter Solutions
2024-11-05 10:35:38
Melbourne, Florida, United States
Job type: fulltime
Job industry: I.T. & Communications
Job description
We've determined which skillsets are most beneficial for this role. These skills are listed first below as the Must Haves and Nice to Haves our hiring team highly prefers. Below that you'll find the standard job description for this opportunity. Must Haves
BS/BA (or equivalent) degree in IT Security or related field, and 2-4 years related experience ; or 4+ years related experience with 2 years post-Secondary/AA-AS degree; or 8+ years related experience with no degree.
Understanding of various Operating Systems.
Understanding of system logs and familiarity with log analysis.
Understanding of cyber-attack vectors (Buffer Overflow, Phishing, etc.)
Ability to obtain and maintain a FAA public trust clearance.
Must be able to work in a fast-paced ever-changing environment.
Must have strong written and oral communication skills, Collaborates with other teams to locate and remediate threats based on intelligence collected and communicated.
Self-motivated and a self-starter, maintain a curiosity and desire to learn, and be able to work well in a team environment.
Nice to Haves:
Information Security Operations Center analyst experience
Understanding of system vulnerabilities and exploitation
Understanding of vulnerability mitigation
Knowledge of SIEM functions threat hunting, correlation of events, dashboard creation, metrics development, and creating alerts based on threat intelligence and other Indictors of Compromise (IOC)s
Strong written and oral communication skills, be self-motivated and a self-starter, maintain a curiosity and desire to learn, and be able to work well in a team environment
Ability to prioritize vulnerability mitigation efforts based on risk assessments
CompTIA Security+ Certification or equivalent certification preferred Essential Functions: Responsible for cybersecurity threat intelligence data collection via open intelligence sources. Organizes, documents, and collaborates discovered intelligence via information sharing platform. Research threat actors, malware, attack vectors, and other threat information, collects indicators of compromise, documents and advises management on prevention and remediation strategies. Continually evaluates accuracy of open source threat intelligence and evolves intelligence collection strategies as sources deteriorate or conflict. Maintains and updates past intelligence with new information is provided. Produces well-written reports outlining current industry threats, findings on managed network, and best practices following detected threats. Collaborates with other teams to locate and remediate threats based on intelligence collected and communicated. Must be able to work in a fast-paced ever-changing environment. Qualifications: 2+ years related experience with BS/BA (Bachelors) in Information Technology/Computer Information Systems or Cyber/Information Security; or 4-6 years related experience with 2 years post-Secondary/AA-AS degree; or 8+ years related experience with no degree. Understanding of various Operating Systems. Understanding of system logs and familiarity with log analysis. Understanding of cyber-attack vectors (Buffer Overflow, Phishing, etc.) Ability to obtain and maintain a FAA public trust clearance. Preferred Additional Skills: Information Security experience. Security+ Certification or equivalent certification preferred. Understanding of system vulnerabilities and exploitation. Understanding of vulnerability mitigation. Knowledge of SIEM functions threat hunting, correlation of events, and metrics development. Must have strong written and oral communication skills, be self-motivated and a self-starter, maintain a curiosity and desire to learn, and be able to work well in a team environment. Ability to prioritize vulnerability mitigation efforts based on risk assessments. Please see our website for more job openings: