ComTec Information Systems - Melbourne, FL

posted 3 months ago

Full-time
Melbourne, FL
Computer and Electronic Product Manufacturing

About the position

The Security Operations Center (SOC) Analyst plays a crucial role in the cybersecurity landscape by being responsible for the collection and analysis of threat intelligence data from various open intelligence sources. This position requires the analyst to organize, document, and collaborate on the intelligence discovered through an information-sharing platform. The SOC Analyst will conduct thorough research on threat actors, malware, attack vectors, and other relevant threat information, collecting indicators of compromise and advising management on effective prevention and remediation strategies. In this dynamic role, the SOC Analyst will continually evaluate the accuracy of open-source threat intelligence and adapt intelligence collection strategies as sources may deteriorate or conflict. It is essential for the analyst to maintain and update past intelligence with new information as it becomes available. The SOC Analyst will also be responsible for producing well-written reports that outline current industry threats, findings on the managed network, and best practices following detected threats. Collaboration with other teams is vital to locate and remediate threats based on the intelligence collected and communicated. The analyst must thrive in a fast-paced, ever-changing environment, demonstrating adaptability and quick thinking in response to emerging threats.

Responsibilities

  • Responsible for cybersecurity threat intelligence data collection via open intelligence sources.
  • Organizes, documents, and collaborates discovered intelligence via information sharing platform.
  • Research threat actors, malware, attack vectors, and other threat information, collects indicators of compromise, documents and advises management on prevention and remediation strategies.
  • Continually evaluates accuracy of open source threat intelligence and evolves intelligence collection strategies as sources deteriorate or conflict.
  • Maintains and updates past intelligence with new information is provided.
  • Produces well-written reports outlining current industry threats, findings on managed network, and best practices following detected threats.
  • Collaborates with other teams to locate and remediate threats based on intelligence collected and communicated.
  • Must be able to work in a fast-paced ever-changing environment.

Requirements

  • 0-4 years related experience with BS/BA (Bachelors) in Information Technology/Computer Information Systems or Cyber/Information Security; or 4 - 6 years related experience with 2 years post-Secondary/AA-AS degree; or 6 - 8 years related experience with no degree.
  • Understanding of various Operating Systems.
  • Understanding of system logs and familiarity with log analysis.
  • Understanding of cyber-attack vectors (Buffer Overflow, Phishing, etc.).
  • Ability to obtain and maintain a FAA public trust clearance.

Nice-to-haves

  • Information Security experience.
  • Security+ Certification or equivalent certification preferred.
  • Understanding of system vulnerabilities and exploitation.
  • Understanding of vulnerability mitigation.
  • Knowledge of SIEM functions threat hunting, correlation of events, and metrics development.
  • Must have strong written and oral communication skills, be self-motivated and a self-starter, maintain a curiosity and desire to learn, and be able to work well in a team environment.
  • Ability to prioritize vulnerability mitigation efforts based on risk assessments.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service