Security Analyst I
Remote Worker - N/A
Description

The Cyber Security Analyst I will work on site with our team to perform security threat monitoring and analysis of our client environments in our Security Operation. Reporting to our VP of Cyber Security, you will use the latest technology to detect, analyze and limit intrusions and security events while adhering to best practices and recognized control frameworks. 

You will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations. You will perform tasks including monitoring, research, classification and analysis of security events that occur within our client environments. You should have familiarity with the principals of network and endpoint security, current threat and attack trends, and a working knowledge of security principals such as defense in depth. 

  • Perform network security monitoring and incident investigation for numerous clients. 
  • Review and triage information security alerts, provide analysis, determine and track remediation, and escalate as appropriate. 
  • Recognize potential, successful and unsuccessful intrusion attempts and compromises through review and analysis of relevant event detail and summary information. 
  • Communicate incidents to clients regarding intrusions and compromises to their network environment. 
  • Maintain records of security monitoring and incident response activities, utilizing case management and ticketing technologies. 
  • Prepare briefings and reports of analysis methodology and results. 
  • Assist with onboarding clients onto the R3 security services. 
  • Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functions. 


 

Requirements

Prior experience working in any of the following three is a plus: Security Operations Center (SOC), Network Operations Center (NOC), Computer Incident Response Team (CIRT) 

Achieved industry recognized professional certification is a plus such as Security+, CEH, GCIH, GCIA, etc. 

  • Basic understanding and knowledge of Windows, Mac, and Linux operating systems 
  • Basic knowledge of network protocols and network fundamentals 
  • Natural curious and inquisitive nature; persistent and determined; enjoys solving problems and puzzles; analytically rigorous; uncompromising integrity.
  • Strong written and verbal skills 
  • Ability to work independently and complete required tasks with minimum supervision 
  • Ability to improve skills and knowledge through both structure training and independent research 
  • Ability to document and explain technical details in a concise, understandable manner 
  • Microsoft technology stack knowledge a plus (Defender for Endpoint, Defender for Cloud, Microsoft Sentinel, etc.)