Security Analyst Tier 3

Security Analyst Tier 3

Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.

Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.

Perform cyber defense trend analysis and reporting.

Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.

Provide daily summary reports of network events and activity relevant to cyber defense practices.

Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.

Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.

Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Determine tactics, techniques, and procedures (TTPs) for intrusion sets.

Recommend computing environment vulnerability corrections.

Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).

Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.

Reconstruct a malicious attack or activity based off network traffic.

Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.

Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.

Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.

Interested candidates please send resume in Word format to [Click Here to Email Your Resumé] Please reference job code


when responding to this ad.

GDH Consulting, Inc. provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, genetic information, veteran's status or any other category protected by law. In addition to federal law requirements, GDH Consulting, Inc. complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities and/or employees. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, benefits and training.


Similar jobs you might like

Systems Analyst V-VI (18-0870)
Office of the Attorney General of Texas Austin, TX
JAVA/Oracle Programmer
Texas Health & Human Services Commission Austin, TX