Job Title: Cyber Defense Analyst (L1)
What you will do
Complete Cyber Monitoring and Incident Response Operations Playbook/Checklist activities including, but not limited to: log review, vulnerability management activities, management report scheduling and running, alert analysis, filter modifications and escalation follow up activity status
Monitor CSOC alert queue and investigate detections for suspicious events
Develop, tune and maintain tools to automate analysis capabilities for network-based, host-based and log-based security event analysis. Create signatures, rulesets, and content analysis definitions from various intelligence sources for a variety of detection capabilities
Organize and maintain documentation of detection capabilities, alert definition, policy configurations, and tool rulesets
Maintain adherence to Cybersecurity Operations Center standards, policies and procedures
Remain up-to-date on the latest security information in order to validate the security analysis and identification capabilities of the security operations technologies
Participate in efforts to analyze and define security filters and rules for a variety of security parameters
In this role, you will bring:
Bachelors degree in cybersecurity or a related 4-year degree, or 3-6 years of relevant IT experience, or 2-4 years of IT Security experience
A good team player with a passion for cyber defense
Intrusion Detection, Network Traffic Analysis, Log Analysis, Rule/Signature/Content Development, programming or scripting required
Ability to analyze logs, alerts, network traffic and other data sources to validate security events
Ability to create signatures and detection content in IDS, SEIM and log analysis platforms
Ability to consume, comprehend and utilize and create indicators of compromise
Perform daily analysis of detection reports and alerts
Maintain tools, scripts and applications for detection and automation capabilities
Identify opportunities for capability and efficiency improvements
Exhibit understanding of tools, tactics, and procedures of malicious actors and advanced persistent threats
Identify and report on detection trends
.... Own part of the company with our Employee Stock Purchase Plan Generous paid time off, company paid training and tuition reimbursement. Positive and safe work environments. Opportunities for growth and development for all the stages of your career....
...facilitates safe transitions of care, organizes practice environment to assure patient safety and quality outcomes, and contributes to HEDIS and designated quality measures. Location : 8820 Columbia 100 Parkway, Columbia, MD 21045 Shift: Non- Exempt - Full-time - 40...
...consumer, business-to-business, and industrial digital imaging solutions to the United States and to Latin America and the Caribbean markets. With approximately $29.4 billion in global revenue, its parent company, Canon Inc. as of 2023 has ranked in the top-five overall...
...City-based specialized agency dedicated to providing top-quality Applied Behavior Analysis (ABA) therapy services for children with autism. Our mission is to empower these children and their families by implementing evidence-based interventions that promote skill...
...coupled with expertise in designing and developing exceptional WordPress websites. An ideal... ...military environment that can have ambiguity at times. Ultimately, the selected candidate... ...the functionality and efficiency of web infrastructure on PAO websites. Experience...