CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Jobs

Security Analyst

AHEAD

Reading Time: 3 mins read
in Jobs

 

Job Description (from the job’s posting): 

Security Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. Security Analysts are the frontline of SOC and are customer-facing representatives.
Security Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response.  Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems.  They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues.
This individual is user focused and works to resolve client needs in a timely manner.  These needs may involve resolving hardware/software failures, investigating and responding to security threats, and making change request to the security policy of company devices.
The Security Analyst is expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipment at client locations.  The Analyst is expected to be familiar with a wide range of security tools and understand basic security fundamentals.
The Analyst will perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis.

Your Responsibilities

  • Monitor and analyze network traffic and alerts
  • Investigate intrusion attempts and perform in-depth analysis of exploits
  • Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident
  • Conduct proactive threat research
  • Review security events that are populated in a Security Information and Event Management (SIEM) system
  • Tuning of rules, filters and policies for detection-related security technologies to improve accuracy and visibility
  • Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest
  • Independently follow procedures to contain analyze and eradicate malicious activity
  • Document all activities during an incident and provide leadership with status updates during the life cycle of the incident
  • Incident management, response, and reporting
  • Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client
  • Track trends, statistics, and key figured for each assigned client
  • Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions
  • Reporting
  • Incident reports
  • Security status reports
  • Client-facing security meetings

 

US Located Required:  Yes

Location: Remote – United States

Schedule: Full time

Salary: USD 60K – 100K

 

Apply Now

Tags: AHEADJobsRemoteSecurity AnalystSenior PositionUnited States
ADVERTISEMENT

Related Posts

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

January 12, 2023
XOR Security – Cyber Hunt/Deception Operations SME

XOR Security – Cyber Hunt/Deception Operations SME

January 12, 2023
Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

January 12, 2023
ITW – IT Security Analyst

ITW – IT Security Analyst

January 12, 2023

More Articles

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

January 18, 2021
Alerts

Hackers hijack Linux devices using PRoot isolated filesystems

December 6, 2022
Alerts

Ransomware Activity Targeting the Healthcare and Public Health Sector

November 3, 2020
Alerts

Schneider Electric security advisory

June 15, 2022
Incidents

KlaySwap crypto users lose funds

February 15, 2022
Course

CCPA training

March 21, 2022
Alerts

BD security advisory (AV22-111)

March 4, 2022
Document

CYBER CRIME & CYBER SECURITY TRENDS IN AFRICA

January 20, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.