Gathering your results ...
7 days
Not Specified
Not Specified
Not Specified
<p>The Information Security Analyst 2 is an intermediate level, professional role that works on assignments with clear instruction and moderate supervision using designated tools and processes to monitor systems and networks. The primary purpose of monitoring systems and networks is to identify unusual or abnormal activity of moderate scope. This position exercises judgement within defined procedures and practices to determine which potential incidents should be escalated through the appropriate channels for further investigation. The position also provides mentoring and training to less-experienced analysts.?This is an individual contributor role.</p> <p>This is a US-based hybrid role, but non-local exceptions may be approved under special circumstances.</p> <p>This individual works with divine guidance to provide or support technology that furthers the mission of the Church and reflects the eternal impact of the gospel.</p> <p>We value early, mid and late-career candidates and encourage all applicants with the posted skills and abilities to apply.</p> <p>Identify abnormal circumstances, events, and event combinations for further review and investigation</p> <p>Mentor and train junior analysts</p> <p>Review logs and reports to identify patterns that would indicate potential security incidents</p> <p>Assist in additional discovery and investigation under the direction of incident managers and higher-level analysts</p> <p>Assist in the clarification and documentation of identified problems for future recognition and remediation</p> <ul> <li>Bachelor's degree or equivalent professional experience </li><li>Two years of related experience (can include internship) in Information Security, IT and/or Computer Science, including expertise in one or more of the following areas: security, privacy, business continuity, compliance or related area(s), attacker tactics for both enterprise and web systems, cyber threat intelligence, incident handling, continuous monitoring, intrusion detection, advanced network forensics, host forensics, SIEM, SOC processes, and malware analysis </li><li>Ability to work effectively in a 24/7 environment </li><li>Demonstrated experience identifying attacks relating to application security, network security, and host security </li><li>Detail-oriented with the proven ability to follow instructions </li><li>Ability to successfully work in a team and mentor others </li><li>Understand how cyber threat intelligence, system storage and memory forensics are used in incident response </li><li>Familiarity with programming and scripting </li><li>Basic knowledge of: </li><li>IT organization patterns </li><li>Networking protocols and technologies </li><li>Information security tools, technologies, threats, and practices </li><li>Windows and Linux operating systems, command line interfaces, and associated security concerns </li><li>Using a SIEM or data aggregation tool to analyze data sets and identify trends, anomalies, and actionable intelligence </li><li>Information security practices, trends and technologies </li><li>Professional written and oral communication skills </li><li>This job operates in a professional office environment </li><li>To successfully perform the essential functions of the job there may be physical requirements which need to be met such as sitting for long periods of time and using computer monitors/equipment </li></ul> <p>Preferred:</p> <ul> <li>Relevant security certification from one or more of the following or equivalent certifying authorities: GIAC, CompTIA, ISC2, EC-Council, etc. </li></ul>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!