Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
A leading company is seeking a Technical Security Analyst to enhance their security posture. The role involves identifying and responding to security incidents, performing forensic analysis, and collaborating with team members to ensure data protection. Candidates should have extensive experience in information security and relevant certifications. This position is crucial for maintaining the integrity of the organization's network and data.
Job Title: Technical Security AnalystLocation: California (Major cities) Oakland, San Francisco, Sacramento, Pleasanton, San Jose, Pasadena, San Diego CADuration: 12 Months
Key Responsibilities:Demonstrate ability to identify, contain, eradicate and recover from security incidentsProactively identify and assess threats to client's users, network and dataMonitor and respond to reports of malicious activityRespond and investigate intrusions and security eventsPerform thorough analysis of attacks and anomalous network behaviorPerform proficient forensic analysis using security tools and processesIdentify Actionable Intelligence by processing Threat Intelligence (TI)Create Standard Operating Procedures and training documents
Basic Qualifications:5+ Years' experience in information security and forensics and/or security incident response.CISSP and CCFP or equivalent certification desired (e.g., CCE, CHFI). Other highly desirable security certifications may be substituted for CISSP (e.g., CISA, CISM, etc.)Extensive knowledge of and proven experience with information technology systems and methods of developing, testing and moving solutions to implementation.Self-motivated self-starters/proactive, working closely and actively communicating with team members to accomplish time critical tasks and deliverables.Work collaboratively with other support team members and independently on assigned tasks and deliverables with minimum supervision.
Preferred Qualifications:Working experience of obtaining Cyber Threat Intelligence and making the information usable through the security incident process.Working experience of applying IOCs to identify threats in the current environment and apply information to prevent future vulnerabilities in infrastructure.Working experience using best practices standards and frameworks: ISO 27001/27002; PCI DSS v4, GLBA; HIPPA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF; CIS RAM.Experience with LAN WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ and network protocols like TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, etc.Experience with security concepts: Encryption, Hardening, Security GRC, Forensic Analysis Tools, Computer Forensic, SIEM, Malware analysis.