Cybersecurity Threat Analyst
Jacksonville, FL 
Share
Posted 4 days ago
Job Description
CYBERSECURITY THREAT ANALYST - REMOTE

ARC Group has an immediate opportunity for a Cybersecurity Threat Analyst with strong SIEM experience! This position is 100% remote! This is starting out as a contract position running through November 2024 with strong potential to extend or possibly convert to FTE. This is a fantastic opportunity to join an established and well-respected organization offering tremendous career growth potential.

At ARC Group, we are committed to fostering a diverse and inclusive workplace where everyone feels valued and respected. We believe that diverse perspectives lead to better innovation and problem-solving. As an organization, we embrace diversity in all its forms and encourage individuals from underrepresented groups to apply.

Position is 100% remote!

Candidates must have permanent work authorization and work for any employer without sponsorship now or in the future. Third party candidates are not eligible for this role.

We are looking for candidates with strong SIEM experience; GCDA certification (not required) or similar experience hands on with SIEM - preferably a variety of SIEM and/or EDR/XDR products. Should be able to write detections within a SIEM and understand the differences between detecting the activity, the results of the activity, and deviations from norm. Able to follow SDLC processes for rule development with strong documentation skills.

Essential Functions
  • Serves as a liaison with IT and business area partners to identify, understand, document and advise on security requirements, impacts and risks and threats.
  • Proactively and automatically correlates and analyzes threat data from various sources and analyzes network events to establish the identity and modus operandi of malicious users active in the computing environment or posing potential threats to the computing environment
  • Independently, but with some level of guidance from Senior Cybersecurity Threat Analyst, conducts industry research and technical evaluation of all-sources and vendor supplied intelligence--with specific emphasis on network operations and advanced and sophisticated cyber tactics, techniques, and procedures
  • Preparing assessments and cyber threat profiles of current events based on collection, research and analysis of open source information
  • Proven technical knowledge of security architecture, tools and controls with specific demonstrated experience in proactive detection, mitigation, and resolution of advanced cyberattacks and./or threats
  • Proven technical knowledge of security infrastructure including security firewalls, data loss prevention, encryption, and end point protection appliances
  • Demonstrated knowledge of information threat analysis and detection concepts and principles and impact
  • Working with and managing vendor performance including applicable service level agreements
  • Conducts and, at times, leads root cause analysis of any monitoring alerts and threats identified by third-party vendor, or internal systems and workforce. Once root cause is determined, proposes and works with other teams, if required, to implement appropriate security controls and solutions that will mitigate risk and vulnerabilities, as well as safeguard our systems and data.
  • Assists in the preparation of detailed technical papers, presentations, recommendations, and findings for Management and other Technology Leaders
  • Periodically provides briefings and presentations to colleagues and leadership supporting analysis of cyber threats
  • Develops and maintains documentation of security monitoring activities, threat response procedures and security diagrams
  • Assists remediation actions as a result of threat and vulnerability assessments or audits
  • Provides training to others on security capabilities, processes, procedures and operational tasks
Qualifications:
  • Strong technical knowledge of security architecture, tools and controls with specific demonstrated experience in proactive detection, mitigation, and resolution of advanced cyberattacks and./or threats
  • Strong technical knowledge of security infrastructure including security firewalls, data loss prevention, encryption, and end point protection appliances
  • Demonstrated knowledge of information threat analysis and detection concepts and principles and impact
  • Experience working and managing vendor performance and service level agreements
  • Knowledge of network infrastructure including routers, switches, firewalls and associated network protocols and concepts.
  • Strong technical knowledge of current systems, software, protocols and standards. (Including TCP/IP and network administration/protocols).
  • Experience developing, documenting and maintaining security procedures.
  • In-depth knowledge of operating systems and security applications
  • Demonstrated ability to work under stress in emergencies with flexibility to handle multiple high-pressure situations simultaneously.
  • Ability to communicate highly complex technical information clearly and articulately for all levels and audiences.
  • Ability to manage tasks independently and take ownership of responsibilities
  • Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel.
  • Ability to adapt to a rapidly changing environment and quickly identify new trends and industry changes specific to security and advanced cyberattacks
  • Ability to evaluate complex, multi-sourced security intelligence artifacts and summarize for consumption by internal stakeholders.
Additional Preferred Qualifications:
  • Exposure to Project Management methodologies like Waterfall, Agile, Lean or SAFe methodologies
Required Work Experience
5+ years related work experience
4+ years in Cybersecurity/1+ years Information Technology Infrastructure

Required Education
Related Bachelor's degree or additional related equivalent work experience Computer Information Systems with Cybersecurity

Required Licenses and Certifications
Certified Information Systems Security Professional (CISSP) or Certified Ethical Hacker (CEH) (within 180 Days if converted to FTE)

Would you like to know more about our new opportunity? For immediate consideration, please send your resume directly to John Burke at johnb@arcgonline.com or apply online while viewing all of our open positions at www.arcgonline.com.

ARC Group is a Forbes-ranked a top 20 recruiting and executive search firm working with clients nationwide to recruit the highest quality technical resources. We have achieved this by understanding both our candidate's and client's needs and goals and serving both with integrity and a shared desire to succeed.

At ARC Group, we are committed to providing equal employment opportunities and fostering an inclusive work environment. We encourage applications from all qualified individuals regardless of race, ethnicity, religion, gender identity, sexual orientation, age, disability, or any other protected status. If you require accommodations during the recruitment process, please let us know.

Position is offered with no fee to candidate.

ARC Group is proud to be an equal opportunity workplace dedicated to pursuing and hiring a diverse workforce.

 

Job Summary
Start Date
As soon as possible
Employment Term and Type
Regular, Full Time
Required Education
Bachelor's Degree
Required Experience
5+ years
Email this Job to Yourself or a Friend
Indicates required fields