Job Description :
Job ID: Sigma, Rackspace_ Security Analyst 3_ ITP20190509-03

Priority: 1

Job Title: Security Analyst 3

# of Positions: 4

Locations: Austin, TX and San Antonio, TX

On-site/Remote: Onsite

Cost/Bill to ITP: TBD

Duration: 6 Months+

Start Date: 6/13/19

JOB TITLE: Security Analyst III

PRIMARY RESPONSIBILITY: Manage operations in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions. Ensure events are properly identified, analyzed, and escalated to incidents. Hunt for suspicious activity based on anomalous activity and indicators of compromise from various intelligence feeds and toolsets. Serve as the technical escalation point and mentor for lower-level analysts. Participate in the response, investigation, and resolution of security incidents. Provide communication throughout an incident per the ISOC Standard Operating Procedures. Communicate directly with end users and asset owners. Maintain a strong awareness of the current threat landscape. Create knowledge base articles for handling medium and high severity incidents. Assist in the advancement of security policies, procedures, and automation. Create custom network-based signatures to improve defensive posture within NIDS and SIEM. Utilize malware analysis techniques (advanced and static analysis) to identify and assess malicious software. Perform computer and network forensic analysis. Develop incident response reporting and policy updates as needed.

KNOWLEDGE/SKILLS/ABILITY: Advanced knowledge and understanding of network protocols and devices. Highly proficient in intrusion analysis and incident response. Advanced experience with Mac OS, Windows, and Unix systems. Demonstrable problem solving, analytical skills and attention to detail. Strong verbal and written communication skills. Ability to handle high-pressure situations in a productive and professional manner. Document and conform to processes related to security monitoring. Provide incident investigation, handling, and response to include incident documentation. Conduct computer evidence seizure, computer forensic analysis, and data recovery. Strong time management, skills with the ability to multitask. Packet and log analysis. Ability to work a flexible work schedule, including weekends. Provide training and mentorship to lower-level security analysts. Provide tuning recommendations for security tools to tool administrators. Understanding and/or experience with one or more of the following programming languages: .NET, PHP, Perl, Python, Java, Ruby, C, C++.General knowledge and experience and expertise with ethical hacking, firewall and intrusion detection/prevention technologies, secure coding practices, and threat modeling. Advanced knowledge of the following: SIEM, Packet Analysis, SSL Decryption, Malware Detection, HIDS/NIDS, Network Monitoring Tools, Case Management System, Knowledge Base, Web Security Gateway, Email Security, Data Loss Prevention, Anti-Virus, Network Access Control, Encryption, Vulnerability Identification.

JOB COMPLEXITY: Monitors global NIDS, Firewall, and log correlation tools for potential threats. Initiates escalation procedure to counteract potential threats/vulnerabilities. Provides incident remediation and prevention documentation. Documents and conforms to processes related to security monitoring. Provides performance metrics as necessary. Provides customer service that exceeds our customers? expectations.

SUPERVISION: Little instruction on daily work, general instruction on new assignments.

EXPERIENCE/EDUCATION: Bachelor?s degree in Computer Science or equivalent combination of education and experience required. GCIA, GCIH required. GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MSA, MCP, or MCSE preferred. 5+ years of experience in a security operations center (SOC) environment required. Experience with SIEM (i.e. Arcsight, QRadar) Sourcefire, FireEye, Snort or an equivalent tool required. Basic system administration skills. Experience with reviewing raw log files, data correlation, and analysis (ie. System logs, netflow, firewall, IDS) required. Experience in creating Snort signatures required.

PHYSICAL DEMANDS: General office environment. May require long periods sitting and viewing a computer monitor. Moderate levels of stress may occur at times. No special physical demands required. Occasional domestic travel, less than 10%.