Multiple Security positions- Texas

Hi all,

 

Short Description

Multiple Security positions- Texas

Description

1)Role:- Security Operations Center (SOC) – Information Security Team Lead
Location:- Austin, TX

Responsibilities:
• Primary responsibilities include developing and mentoring the SOC L1 – L3 Information Security Analysts, ensuring processes are followed, updating and creating new processes as needed, setting and tracking metrics, and driving new detections/use cases from the SOC Analyst perspective.
• Serves as an escalation point of contact for L1 , L2 and L3 Security Operations Center (SOC) analysts.
• Work collaboratively with multiple teams as well as subject matter experts to include threat hunters, counter-threat Intelligence analysts, incident responders and forensic investigators.
• Stay current with and remain knowledgeable about new threats. Analyze threat actor tactics, techniques and procedures (TTPs) from security events across a large heterogeneous network of security devices and end-user systems.
• Utilize security models and frameworks for documenting and tracking purposes, (e.g. MITRE ATT&CK framework, Cyber Kill Chain (CKC) framework)
• Leverage automation and orchestration solutions to automate repetitive tasks.
• Assist with incident response as events are escalated, including triage, containment, remediation and documentation.
• Collaborates with the owners of cyber defense tools to tune systems for optimum performance and to maximize detection and prevention effectiveness. and minimize false positives.
• Work alongside other security team members to search for and identify security issues generated from the network, including third-party relationships.
• Investigate and document events to aid incident responders, managers and other SOC team members on security issues and the emergence of new threats.
Minimum Requirements:
• Requires 7+ years of professional work experience
• BA/BS degree or equivalent experience
Critical Skills:
• 5-7 years of information security monitoring experience.
• Experience working in a 24×7 operational environment, with geographic disparity preferred.
• Experience working with SIEM systems, Endpoint Detection and Response (EDR) solutions, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), Data Loss Prevention and other network and security monitoring tools.
Preferred:
• Certifications related to security (such as Security+, GSEC, GCIH, GCIA, CISSP, NCSF, etc)
• Certifications in Splunk

2) Role:- Sr. Security Incident Response Analyst
Locations:- Irving Texas or Austin Texas

Position Description/Responsibilities
• Coordinate and drive incident response efforts (identification, containment, eradication, remediation), and post-mortem as the cybersecurity incident commander.
• Collaborate with the Security Operations Center and provide expert technical support to cyber defense technicians to resolve cyber defense incidents and enable timely collection
• Coordinate with Cyberthreat intelligence teams on monitoring external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.
• Participate in after hours on-call when required

Critical Requirements
• 6+ years of professional experience, including 2+ of professional experience in incident response, security operations center, forensics, or related cybersecurity fields
• Strong technical aptitude and experience with a wide variety of technologies including intrusion detection and prevention, networking, operating systems, packet analysis
• Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
• Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks)
• Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
• Strong analytical skills for log analysis and root cause identification
• Well-developed analytic, qualitative, and quantitative reasoning skills and demonstrated creative problem-solving abilities
• Interpersonal, organizational skills with ability to communicate effectively with both technical and non-technical stakeholders

Additional Requirements
• Knowledge of the healthcare, distribution, or software industries is a plus
• GCIH (Certified Incident Handler), CISSP (Certified Information Systems Security Professional) certification or equivalent

3) Role:- Senior Information Security Analyst
Locations:- Irving Texas or Austin Texas

Qualifications:
• At least 5-7+ years’ experience in information security administration, offensive tactics, monitoring and IR.
• Proficient in scripting languages such as Python, PowerShell, Bash and Ruby.
• Competent with testing frameworks and tools such as Burp Suite, Metasploit, Cobalt Strike, Kali Linux, Nessus, PowerShell Empire and AutoSploit.
• Experience conducting penetration-testing/red team engagements as a consultant or within a previous role in a professional organization.
• Strong operating system knowledge across *nix, Windows and Mac; proficient with networking protocols.
• Ability to obtain and maintain persistence within corporate systems, while avoiding detection.
• Familiarity with defensive and monitoring technologies such intrusion prevention/detection systems (IPS/IDS), security information and event management systems (SIEMs), firewalls, endpoint protection (EPP) and endpoint detection/response (EDR) tools, as well as user and entity behavior analytics (UEBA).
• Understanding of OWASP, the MITRE ATT&CK framework and the software development lifecycle (SDLC).

Additional Skills and Experience:
• Proven trustworthiness and history of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating well.
• Self-starter requiring minimal supervision.
• Excellence in communicating business risk and remediation requirements from assessments.
• Analytical and problem-solving mindset.
• Highly organized and efficient.
• Demonstrated strategic and tactical thinking, along with decision-making skills and business acumen.

Education Requirements:
• Bachelor’s degree in computer science (preferred), information assurance, MIS or related field, or equivalent experience.

Certifications:
• Preferably, one or more of the following: OSCP, OSCE, GPEN, GWAPT, CISSP.

Client/Vendor

Happiest Minds

 

 

Thanks & Regards,

 

Sumanjali

Marvel Infotech, Inc.

Email – :sumanjali@marvelinfotech.com

Phone – 732-722-5530

Website – www.marvelinfotech.com

MBE – NMSDC – NYNJ

 

About Author

JOHN KARY graduated from Princeton University in New Jersey and backed by over a decade, I am Digital marketing manager and voyage content writer with publishing and marketing excellency, I specialize in providing a wide range of writing services. My expertise encompasses creating engaging and informative blog posts and articles.
I am committed to delivering high-quality, impactful content that drives results. Let's work together to bring your content vision to life.

Leave a Reply

Your email address will not be published. Required fields are marked *