Enable job alerts via email!

A4949 - Security Analyst 9-5026

Focused HR Solutions

Dover

On-site

GBP 35,000 - 55,000

Full time

15 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a dedicated Security Analyst to join their team. In this role, you will be responsible for monitoring network traffic and system logs to detect potential security threats while responding swiftly to incidents. Your expertise will be crucial in utilizing security tools, conducting log analysis, and collaborating with IT professionals to ensure a secure environment. This position offers the chance to work in a dynamic setting where your contributions will directly impact the organization's cybersecurity posture. If you are passionate about safeguarding digital assets, this opportunity is perfect for you.

Qualifications

  • Bachelor's degree in relevant field required.
  • Experience in security roles with strong cybersecurity knowledge.

Responsibilities

  • Monitor network traffic and system logs for security threats.
  • Respond to and resolve security incidents effectively.
  • Collaborate with IT professionals to enhance security measures.

Skills

IT Basics
SIEM Systems
IDS/IPS
Firewalls
Antivirus
Endpoint Detection Tools
Python
PowerShell
Computer Forensics
Incident Response
Threat Intelligence
Communication
Problem-Solving
Adaptability

Education

Bachelor's degree in Computer Science
Bachelor's degree in Information Technology
Bachelor's degree in Cybersecurity

Tools

SIEM Systems
IDS/IPS
Firewalls
Endpoint Security Solutions

Job description

100% on site.

Our direct client has an opening for a Security Analyst 5026.

This position is up to 13 months with the option of extension. The client is located in Dover, DE.

If you are interested, please submit the following:

  1. YOUR CURRENT RESUME.
  2. YOUR HOURLY RATE.

Key Responsibilities:

  1. Security Monitoring: Continuously monitor network traffic, system logs, and other security tools to detect unusual or suspicious activities that could indicate an incident or vulnerability.
  2. Incident Detection and Response: Identify and categorize security incidents such as malware infections, data breaches, and insider threats. Respond swiftly to contain, mitigate, and resolve incidents.
  3. Alert Triage: Assess alerts generated by security tools, determine their severity, and prioritize responses accordingly.
  4. Threat Intelligence and Hunting: Stay updated on the latest cybersecurity threats, vulnerabilities, and attack techniques to enhance monitoring and response efforts. Leverage these findings to conduct proactive threat hunting across SIEM and EDR platforms.
  5. Log Analysis: Examine logs from a range of sources including firewalls, intrusion detection systems, antivirus software, and system endpoints to identify irregularities that may signal a threat.
  6. Security Tool Management: Operate and manage security technologies such as SIEM systems, IDS/IPS, firewalls, PKI management, and endpoint security solutions.
  7. Documentation and Compliance: Maintain accurate records of security incidents and ensure compliance with industry standards and regulations.
  8. Collaboration: Work closely with other security and IT professionals to investigate and resolve security issues.
  9. Continuous Improvement: Contribute to refining security processes and developing new detection and prevention rules.

Required Skills:

  1. Technical Proficiency: Strong understanding of IT basics, including operating systems, network protocols, and security tools.
  2. Hands-on Experience with Security Tools: Proficiency in using SIEM systems, IDS/IPS, firewalls, antivirus, and endpoint detection tools.
  3. Coding Skills: Knowledge of programming languages like Python or PowerShell for automating tasks and creating scripts.
  4. Forensics Knowledge: Basic understanding of computer forensics for incident investigation.
  5. Log Analysis: Ability to analyze logs to spot patterns and anomalies.
  6. Incident Response: Experience in responding to security incidents effectively.
  7. Threat Intelligence: Understanding of attack patterns and tactics used by cybercriminals.
  8. Communication: Excellent communication skills for reporting and collaboration.
  9. Problem-Solving: Strong analytical and problem-solving abilities.
  10. Adaptability: Ability to adapt quickly to evolving cyber threats.

Qualifications:

  1. Education: Bachelor's degree or higher in Computer Science, Information Technology, Cybersecurity, or a related field.
  2. Experience: Previous experience in a security-related role with a strong understanding of cybersecurity principles and technologies.
  3. Certifications: Relevant certifications such as CompTIA Security+ or equivalent are beneficial.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.