Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Cyber Security Operations Analyst

Eleven Recruiting

Cyber Security Operations Analyst

Los Angeles, CA
Full Time
Paid
  • Responsibilities

    Our client, a law firm headquartered in Los Angeles, CA is looking for a Cybersecurity Operations Analyst. The Cybersecurity Operations Analyst is responsible for supporting processes and technologies for the Firm’s security continuous monitoring capability. The primary responsibility is to support security event monitoring, management and response architecture to include but not be limited to assisting with the development of enterprise logging, end user behavior analytics, and security metrics and reporting. The Cyber Security Operations Analyst will participate in the development of security best practices to achieve the goals of the enterprise security architecture, as well as act as a liaison to other teams.

     

    Responsibilities: 

    • Provide technical support for 24x7x365 continuous monitoring and investigation of correlated security event feeds and the appropriate triage and escalation in case of an identified security events
    • Support reporting to enable visibility across the Firm’s enterprise (ex. SIEM/UEBA, SOAR, ITSM, EDR, IPS/IDS, Active Directory, DNS, etc.)
    • Act as liaison and point of entry between Information Technology (IT) and managed security service providers ensuring the engagement of the appropriate leadership in to sustain the operations of critical security infrastructure and computer network defense capabilities
    • Assist in threat and vulnerability management, threat modeling, identify threat vectors and develop use cases for security monitoring
    • Delivery reporting for security operations center performance metrics, reports, and dashboards

    Preferred Qualifications:

    • Experience managing security operations to monitor controls for misconfigurations, anomalous activity, and network intrusion attempts
    • Monitor, detect, analyze, and respond to network defense incidents
    • Advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures (Firewalls, End Point Security, Proxies, WAFs, Vulnerability Management, I&AM, etc.)
    • Administration of Security tools such as Palo alto NGFW, Cortex XDR, Crowdstrike, Splunk and other UEBA systems
    • Significant expertise in Cybersecurity Operations and expert experience in one or more areas of Cybersecurity: Intrusion Detection and Mitigation, Cyber Network Defense, Network Traffic Analysis or Operating System Security, Forensics, Incident Response, Cyber Threat Hunting, or Malware Analysis and Reverse Engineering
    • Create Dashboards and generate reporting metrics
    • Familiar with various malware categories, their characteristics, and network-based indicators of compromise.

    Qualifications:

    • Have minimum of eight (8) years of experience with cybersecurity or information technology
    • BS degree in Computer Science or related field
    • Experience maintaining security operations metrics and SLAs
    • Detailed technical knowledge of network, database, and/or operating system security
    • Experience with network security, technologies, and monitoring tools
    • Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release management
    • Experience with secure architecture principals, secure SDLC, security system integration and configurations, and troubleshooting
    • Analytical skills as well as proven information security delivery experience in a medium-to-large organization