Lead Cyber Security Analyst

This job posting is no longer active

Responsibilities

The Verizon Cyber Intelligence Center is dedicated to develop and drive added value to the Verizon’s security services portfolio, by leveraging and integrating superior Cyber Intelligence within our services. They respond to all manner of security incidents, create intelligence through research of the ever-changing infosec risk environment, design, implement, and deliver advanced solutions based on credible data analysis, and cultivate knowledge within Verizon, its clients, and the security community.

We are seeking a trustworthy and qualified team member to expand and enhance our activities involved in meeting these objectives. The Security Analyst will be responsible for incident handling, incident response and escalation management in a 24x7 environment and will monitor network flow for malicious activity and anomalies, using non-traditional analytics and advanced intelligence. Successful applicants will think critically, work well under pressure and possess good written and verbal communication skills.The Security Analyst will also perform routine actions in order to help manage customer security devices. Further, the Security Analyst may be placed on-call in order for the SOC to surge to handle emergencies. Finally, as a Security Analyst you will be responsible for other duties as assigned. As a Security Analyst, you will manage change requests from customer issues, update policies on customer firewalls, and escalate problems and issues to other engineering teams as needed or required. You will document all tickets and requests through the ticketing systems before the end of each shift. You will ensure a successful handoff of procedures between SOC and NOC. Must be willing and able to work a shift routine

Qualifications

Required Experience

  • Bachelor's degree preferred with minimum 3 - 5 years of experience in the information security sector, specifically within one or more of the following areas:
  • Cyber Intelligence Operations: proactive all-source intelligence collection - especially collection of indicators of compromise (IOCs). Tracking malicious actors, their activities, the associations among them, and the identification and classification of the associated indicators of their activities. Areas of focus around crimeware/botnets, state-affiliated actors, high-level organized crime, and DDOS.
  • Security Response: Incident response, digital forensics, and malware analysis & reverse engineering - particularly those wanting to move into an R&D capacity.
  • Data Science and Analytics - to include aggregating, manipulating, examining, mining, exporting, reporting, and visualizing threat intelligence and incident data. Understands concepts and technologies related to big data warehousing, Hadoop and data reduction technologies
  • Security Monitoring: elaborate knowledge and strong experience with security monitoring methodologies such as packet capture, netflow, patterns, watch lists, log parsing, correlation, classification, event generation, taxonomy, filtering, asset and vulnerability data, etc; Working knowledge and proven experience with incident handling, investigation and remediation best practices.
  • Advanced level of experience with security visualization tools such as Splunk.
  • A good level of networking expertise and understanding of routing principles and networking fundamentals, including Netflow.
  • Experience with Linux/Unix and an understanding of database technologies and is familiar with scripting or programing Perl, Python, bash, and SQL.
  • Experience with one or more of the following:
  • TCP/IP networking
  • Various Intrusion Detection Systems
  • Various firewall systems
  • Various scanning systems
  • Strong knowledge of Information Security concepts
  • Broad knowledge of information and communication technologies and the diverse policies, practices, and technologies used to protect them.
  • A strong aptitude for both independent and team-oriented work, critical thinking, and mastering new concepts and technologies.
  • Must have the necessary communications and interpersonal skills and be able to work effectively with peers, management, staff, and internal/external business partners/clients.
  • Strong ability to handle multiple tasks simultaneously.
  • This position demands excellent character and discretion in handling sensitive and critical information, as well as the ability to pass financial and criminal background checks.

Desired Experience

  • Understanding of latest hacking techniques, vulnerability disclosures, data breach incidents and security analysis techniques.
  • Non-vendor specific certifications such as CISSP and preferably SANS/GIAC.
  • Current US government clearance or the ability to attain one.
  • Able to cobble together effective solutions to unique problems using a combination of existing tools and custom code/scripts

Equal Employment Opportunity

  • Verizon is a Federal Contractor
  • Verizon requests veteran priority referrals
  • Verizon is an equal opportunity and affirmative action employer M/F/Disability/Vet.