As an information security analyst, you will be responsible for managing and implementing threat monitoring for FedRAMP systems. This includes enhancing threat monitoring analytics, performing threat hunting, and working on cyber security incident response activities.
The Information Security Analyst will be responsible for various security operations, including participating in monitoring and investigations, assisting with SEIM log ingestion, integration, and management, developing threat monitoring use cases, and creating SEIM detection rules. The role involves identifying false positive alerts and performing SEIM rule tuning, as well as participating in cybersecurity incident response. In addition, the analyst will perform data and log analysis as part of threat-hunting activities and monitor and report on security compliance within the technology organization in accordance with security policies.
Required Qualifications:
A Bachelor's degree in information systems, business management or equivalent work experience 3+ years’ experience in analyst and/or consultant roles in one or more areas of IT security 3+ years’ experience working with public cloud providers (Azure, AWS) Basic knowledge of cloud technology and terminology Moderate proficiency with using Azure Sentinel and KQL Knowledge of and experience in developing and documenting requirements Experience and understanding of technology-based organizations Some experience with logging and alerting platforms, including SIEM integration Current understanding of Industry trends and emerging threats Knowledge of incident response methodologies and technologies Experience of investigation techniques and report writing Experience of risk management methods and logging of risks Experience of process mapping and delivery of effective and understandable process maps and associated procedures Ability to interact with senior management stakeholders, with excellent verbal and written communication skills, build strong relationships at all levels and across all business units and organizations, and understand business imperatives Understanding of extensive and wide-ranging security requirements Distillation of the security requirements into practical, proportionate and understandable instructions and guidance across the various software productsDesired Qualifications
Background in network, host, database, and application security Experience driving a culture of security awareness Ability to provide effective training and education to others Coding skills to enable hands on automation of processes