Security Operations Center Analyst

San Francisco  ‐ Onsite
This project has been archived and is not accepting more applications.
Browse open projects on our job board.

Keywords

Description

A leading healthcare organization in the San Francisco Bay Area is looking for a talented SOC Analyst on a contract to hire basis, who will sit within the Computer Incident Response Team, as an Incident Responder and Threat Analyst. You will be reporting to the Chief Security Officer and the Director of Security Operations who is responsible for managing IT security incidents including incident detection and analysis, forensics, containment, eradication and recovery, and post-incident lessons learned performing threat vector analysis. You will also determine potential impact of specific identified threats; performing system and network log collection and analysis; creating and supporting automated processes for process and workflow integration with ticketing systems; and developing appropriate metrics (key risk and key performance indicators).
The ideal candidate for this position is a highly qualified, detail-oriented individual who anticipates and works to resolve problems proactively; is a strong critical thinker; can analyze and process large data sets.

Responsibilities:
Key responsibilities include:
Manage IT security incidents including incident detection, analysis and digital forensics, containment, eradication and recovery, and post-incident lessons learned.
Coordinate all aspects of incident response across multiple stakeholders.
Perform detailed analysis combining analytical skills with advanced knowledge of IT security and network threats.
Perform system and network log collection and analysis.
Create and support automated processes and workflow integration with ticketing systems.
Develop and maintain incident related metrics. Prepare status reports and executive presentations.
Proactively ensures that all SIRT team members and other relevant stakeholders are fully aware of, and properly engaged in incident response activities.
Threat Analysis: Perform proactive all-source research to identify and characterize current and emerging threats, vulnerabilities, and risks.
Performs threat assessment and provides mitigation recommendations.
Identifies, evaluates, and catalogues sources of information security-related threat intelligence.
Designs and develops techniques to detect malicious activity at the user, host, and network levels. Identify gaps in security monitoring and detection capabilities.
Utilizes analytical and communication skills to identify and develop mitigation strategies for emerging threats.

Required Qualifications:
- Bachelor degree in computer science or a related field and/or equivalent combination of education, certification and experience.
- Approximately three years demonstrated experience in incident response or a related role requiring confidentiality, timeliness, analysis, prioritization, problem solving, and ability to work collaboratively and independently.
- Demonstrate ability to lead successful incident response efforts involving multiple stakeholders.
- Certification or extensive experience with one or more of the following technologies: Computer Forensics (EnCase), Security Incident and Event Management (e.g. ArcSight, Envision, Splunk), Anti-virus/Malware analysis, Log analysis (Envision preferred), Internal ticketing system(s) for incident response, and change management (e.g. ServiceNow, Altiris, Footprints), Scripting experience (Perl, python, shell), Netflow data analysis

Desired Qualifications:
- Recognized security certifications: GCIH, CISSP, GCIA, GCFE, GCFA -Practical Information Security experience within the Healthcare field
- Unix sysadmin, windows, network admin, firewall admin
Start date
09/2014
From
Real Staffing
Published at
24.07.2014
Project ID:
746989
Contract type
Freelance
To apply to this project you must log in.
Register