Job Title: Cyber Defense Analyst (L1)
What you will do
Complete Cyber Monitoring and Incident Response Operations Playbook/Checklist activities including, but not limited to: log review, vulnerability management activities, management report scheduling and running, alert analysis, filter modifications and escalation follow up activity status
Monitor CSOC alert queue and investigate detections for suspicious events
Develop, tune and maintain tools to automate analysis capabilities for network-based, host-based and log-based security event analysis. Create signatures, rulesets, and content analysis definitions from various intelligence sources for a variety of detection capabilities
Organize and maintain documentation of detection capabilities, alert definition, policy configurations, and tool rulesets
Maintain adherence to Cybersecurity Operations Center standards, policies and procedures
Remain up-to-date on the latest security information in order to validate the security analysis and identification capabilities of the security operations technologies
Participate in efforts to analyze and define security filters and rules for a variety of security parameters
In this role, you will bring:
Bachelors degree in cybersecurity or a related 4-year degree, or 3-6 years of relevant IT experience, or 2-4 years of IT Security experience
A good team player with a passion for cyber defense
Intrusion Detection, Network Traffic Analysis, Log Analysis, Rule/Signature/Content Development, programming or scripting required
Ability to analyze logs, alerts, network traffic and other data sources to validate security events
Ability to create signatures and detection content in IDS, SEIM and log analysis platforms
Ability to consume, comprehend and utilize and create indicators of compromise
Perform daily analysis of detection reports and alerts
Maintain tools, scripts and applications for detection and automation capabilities
Identify opportunities for capability and efficiency improvements
Exhibit understanding of tools, tactics, and procedures of malicious actors and advanced persistent threats
Identify and report on detection trends
...Contracts Administrator $1B+ Capital Construction Project Location: Anderson, SC (2025) Defiance, OH (20262027) Reports To: Project Controls Manager Industry: Industrial/Process Manufacturing Project Type: Large-scale greenfield site 1.5M sq. ft....
...We are interested in every qualified candidate who is eligible to work in the United States. However, we are not able to sponsor Visa's. About SEEK Professionals You are a person with unique skills, experience and education. When you want to be heard and when...
...are a small, but growing company that puts work life balance first! If you love having... ...position is for you! T.R.A.C. is an all in home company looking for supervisors interested... ...with the BACB. LARA License BCBA Requirements: Must have obtained a BCBA...
...role, you will enable digital transformation for our clients in a global delivery model, research on technologies independently,... ...Technology. At least 3 years of experienced in Adobe Analytics for insights and reporting. Database Management: Familiarity with SQL,...
Under supervision, the EEG Technologist is responsible for the performance of standard and complex recordings to include pediatric and ambulatory EEGs and ENDs. Will cover both inpatient and outpatient studies. Minimum Education Associates degree in Health Sciences...