Security Operations Center Analyst

Clark Creative Solutions
Port Hueneme, CA, US
Full-time
Quick Apply

We are seeking a skilled (SOC) Cyber Analyst to join our team. The ideal candidate will be responsible for monitoring security events, responding to incidents, and ensuring the safety and security of our organization.

The Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks.

This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification / triage.

An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior.

This role requires a familiarity with what routine OS activities and common software / user behavior looks like in the context of forensic artifacts or timelines.

Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how / where they can be leveraged to identify known-bad files / activity on an endpoint.

Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.

Responsibilities Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.

Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.

Asses Security Technical Implementation Guides (STIGs) compliance and completion. Utilize asset mapping tools to verify connected inventory.

Handle Information Assurance Vulnerability Management (IVAM) notifications. Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.

Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.

Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.

Qualifications (Journeyman level) At least 3 years, (Junior level) applicable 1 to 2 years of experience in security operations, demonstrating analytical duties and preforming host or ne analysis.

Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system / application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures.

Applied knowledge of network topologies, protocols (e.g., TCP / IP, ICMP, HTTP / S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.

Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&

CK framework, with the ability to collaborate effectively across multiple locations. Desired Skill sets Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS) Strong analytical and troubleshooting skills Able to provide expert content development in Splunk Enterprise Security using tstats and data models Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases Familiar with the operations and functions of Nessus or security center management Can assist and provide technical input to research, discover, implement hardware and software Understands importance and fundamentals of logistics and evidence handling Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include : Offensive Security Certified Professional (OSCP) GIAC Response and Industrial Defense (GRID) CERT Certified Computer Security Incident Handler ECC CEH (Electronic Commerce Council Certified Ethical Hacker) GCIH (GIAC Certified Incident Handler) GISF (GIAC Information Security Fundamentals) CISSP (Certified Information System Security Professional) Additional certifications at an equivalent may also be considered. Powered by JazzHR

30+ days ago
Related jobs
Clark Creative Solutions
Port Hueneme, California

Desired Skill sets Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS) Strong analytical and troubleshooting skills Able to provide expert content development in Splunk Enterprise Security using tstats and data models Understands how to utilize knowledge of latest threats an...

Allied Universal
Ventura, California

Must possess one or more of the following:Service in Military Occupational Specialty related to law enforcement, security (such as Military Police, Elite Military Forces, combat arms) or any support role in a Combat ZoneGraduate of a Certified Public Safety Academy (military or civilian) in the law ...

KBR
Oxnard, California

Supporting defense modernization and national security across land, sea, air, space, and cyberspace, DSE ensures customer satisfaction with its expertise in scientific research, engineering, and mission operations. Big Data Operations Analyst – Job Summary. As an Operations Analyst you will be provi...

Promoted
Allied Universal
Naval Air Station Point Mugu, California

As a Hospital Security Officer,. The Hospital Security Officer is responsible for the surveillance of the clients healthcare premises and the protection of the staff, members, and visitors. Allied Universal, North Americas leading security and facility services company, provides rewarding careers th...

Absolute International Security, Inc.
San Bernardino-RiversideCounty, California, United States of America

Absolute International Security (AIS) is a licensed Bureau of Security and Investigative Services (BSIS) Private Patrol Operator that provides security services spanning Riverside and San Bernardino Counties. Unarmed Security Officer (Riverside/San Bernardino). Due to our rapid growth and the increa...

Merit Services
CA

As an Event Security Officers important for upholding security, delivering outstanding customer service, and ensuring seamless management of events. Merit Services is seeking a skilled Event Security Officer to join our client’s dynamic team in Vancouver. Perform comprehensive security screenings at...

Kore1
Oxnard, California

The Senior Cyber Security Engineer will be responsible for the design, implementation and management of advanced security measures to protect the compan's digital infrastructure and assets. The Senior Security Engineer will play a key role in shaping the city's cybersecurity strategy and protecting ...

Highmark Health
CA, Working at Home, California

Performs modeling of data sources and flows, works with data management staff to define an operational framework that will define, develop and implement policies and security frameworks to ensure precise and secure delivery of knowledge and information. Perform modeling of data sources and flows, wo...

Motion Recruitment
CA, United States

Consult on or participate in moderately complex initiatives and deliverables within Information Security Engineering and contribute to large-scale planning related to Information Security Engineering deliverables. Outstanding long-term contract opportunity! A well-known Financial Services Company is...

Dynamic Solutions Technology LLC
CA, USA

Provides assistance for personnel / users needing information/assistance with Information Assurance (IA) related issues. Implements system security policies, and scans. Provides Cybersecurity reporting requirements to appropriate authorities. Directly supports Information Assurance (IA) requirements...