Highly organized and flexible with hours worked, may be called on to work alternate shifts. Ability to work well with the Security Operations Center.
Education and Experience Requirements:
Bachelor’s Degree or equivalent combination of education and experience to successfully perform the essential functions of the job. Degree in information security, Computer Sciences or Technology related field preferred.
Under supervision, the Cyber Intrusion Analyst I will provide frontline security monitoring, analysis, investigations and incident response. The analyst will perform monitoring and analysis of security systems data from multiple security systems.
Principle Duties and Responsibilities:
Essential Functions: 14. The analyst will perform monitoring and analysis of security systems data from multiple security components including firewalls, IPS, VPN, web filtering, SIEM systems, host based intrusion detection, email filtering etc. Monitor Intrusion Detection systems (IDS) Analyze security data to effectively detect intrusions & attempted intrusions and to initiate and engage the proper resources to mitigate the risk and validating (IDS) alerts. 2. Collecting and analyzing investigative information and data (e.g. internet history information, system logs, network traffic activity, encrypted or erased data) to identify signs or sources of compromise, poor security practices and unauthorized activities. 3. Enforcing procedures for preventing web abuse; guiding the administration of security tools that monitor web security. Conducting preliminary security investigations related to employee abuse of security policies. 4. Examining and analyzing network traffic, related applications and operating systems to identify potential threats, anomalous or malicious activities to network resources 5. Conducts preliminary forensic collections of electronic evidence including information system and network devices for legal, human resources, ethics, and information security. 6. Support of customers with security and general technology needs.
Additional Functions: 1. Able to be on call for incidents and problems; also able to work different shifts. 2. Able to travel as needed. 3. Proficient in the use of incident response and forensics tools such as FTK, Encase, and Cellebrite. Perform other duties as assigned.
Other Requirements: 1. Must have an understanding of cyber forensics, networking, and information security technologies and be able to demonstrate outside-the-box thinking and continuous learning. 2. Experience with the following operating systems: Windows, OSX, IOS, Linux or UNIX. 3. Security Certification such as CISSP, CEH, ACE, EnCE, CCE, Security+ etc. is a plus.
A credit history check from a national credit bureau will be conducted for all candidates for this position including new hires and current employees seeking promotion or transfer.
Languages Required (in addition to English): None
Requisition Number: 117516
Category: Information Systems
Percentage of Travel: Up to 25%
Employment Type: Full-time
Posting End Date: 10/12/2017
Gulfstream does not provide work visa sponsorship for this position, unless the applicant is a currently sponsored Gulfstream employee.