drjobs Information Security Analyst 2

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Riverton, NJ - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Description

The Information Security Analyst 2 is an intermediate level professional role that works on assignments with clear instruction and moderate supervision using designated tools and processes to monitor systems and networks. The primary purpose of monitoring systems and networks is to identify unusual or abnormal activity of moderate scope. This position exercises judgement within defined procedures and practices to determine which potential incidents should be escalated through the appropriate channels for further investigation. The position also provides mentoring and training to lessexperienced is an individual contributor role.

This is a USbased hybrid role but nonlocal exceptions may be approved under special circumstances.

This individual works with divine guidance to provide or support technology that furthers the mission of the Church and reflects the eternal impact of the gospel.

We value early mid and latecareer candidates and encourage all applicants with the posted skills and abilities to apply.



Responsibilities

Identify abnormal circumstances events and event combinations for further review and investigation

Mentor and train junior analysts

Review logs and reports to identify patterns that would indicate potential security incidents

Assist in additional discovery and investigation under the direction of incident managers and higherlevel analysts

Assist in the clarification and documentation of identified problems for future recognition and remediation



Qualifications
  • Bachelors degree or equivalent professional experience
  • Two years of related experience (can include internship) in Information Security IT and/or Computer Science including expertise in one or more of the following areas: security privacy business continuity compliance or related area(s) attacker tactics for both enterprise and web systems cyber threat intelligence incident handling continuous monitoring intrusion detection advanced network forensics host forensics SIEM SOC processes and malware analysis
  • Ability to work effectively in a 24/7 environment
  • Demonstrated experience identifying attacks relating to application security network security and host security
  • Detailoriented with the proven ability to follow instructions
  • Ability to successfully work in a team and mentor others
  • Understand how cyber threat intelligence system storage and memory forensics are used in incident response
  • Familiarity with programming and scripting
  • Basic knowledge of:
    IT organization patterns
    Networking protocols and technologies
    Information security tools technologies threats and practices
    Windows and Linux operating systems command line interfaces and associated security concerns
    Using a SIEM or data aggregation tool to analyze data sets and identify trends anomalies and actionable intelligence
    Information security practices trends and technologies
  • Professional written and oral communication skills
  • This job operates in a professional office environment
  • To successfully perform the essential functions of the job there may be physical requirements which need to be met such as sitting for long periods of time and using computer monitors/equipment

Preferred:

  • Relevant security certification from one or more of the following or equivalent certifying authorities: GIAC CompTIA ISC2 ECCouncil etc.



Required Experience:

IC

Employment Type

Full-Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.