Description
Gibbs S3 are looking for experienced SOC Security Intelligence Analysts to analyze information and intelligence relevant to threats facing the systems, infrastructure, and resources critical to the clients needs.
Ideal candidates will be experienced in analysing cyber threats and security intelligence and determining indicators of compromise.
Must display enthusiasm and interest in Information Security.
Standard Job Requirements
- Provide initial analysis of security intelligence feeds
- Provide communication and escalation to senior intelligence analysts for severe intelligence findings.
- Hunting for indicators of compromise, using various toolsets, based of intelligence gathered.
- Takes an active part in the gathering, analysis, and communication of threat intelligence through the intelligence process.
- Escalating issues when necessary
Technical Competencies
- Strong Analytical and Problem Solving Skills
- Knowledge of security intelligence threats and threat actors.
- Knowledge of log formats for syslog, HTTP logs, DB logs and how to gather forensics for traceability back to event
- Knowledge of packet capture and analysis
- Experience with log management or security information management tools
- Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat)
Preferred:
- Security Essentials - SEC401 (optional GSEC certification)
- Intrusion Detection In Depth - SEC503 (optional GCIA certification)
If you would like to be considered for this position then please submit your CV online, or send your details to (see below)
* Due to the high volume of applications, only relevant candidates will be considered..*