Job Title:Cybersecurity Analyst (Mid)
Location: NCR or Clarksburg
Job Category: Information Technology
Time Type: Full-time
Clearance Requirement: Current TS/SCI Clearance required
Security Suitability: Must pass FBI security suitability
Polygraph Requirement: Must pass an FBI administered Counterintelligence polygraph if one has not been conducted within the last five years.
Employee Type: W2 or 1099
Citizenship: US Citizen, no Dual Citizenship
Summary:
NexThreat is seeking Cybersecurity Analyst (Mid). The Mid-Level Cybersecurity Analyst is an integral part of the Watch Floor Team within the Security Operations Center (SOC). This team operates around the clock, 24/7, 365 days a year, ensuring the timely detection and resolution of potential security incidents. By minimizing the impact of cyber threats, the team plays a crucial role in safeguarding the confidentiality, integrity, and availability of the organization’s information assets. The Mid-Level Analyst is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats.
Key Responsibilities:
· Monitor security events and alerts using industry-standard tools to identify potential threats and vulnerabilities.
· Analyze and investigate security incidents, documenting findings and recommending remediation steps.
· Collaborate with the Watch Floor Team to ensure efficient incident detection and response.
· Assist in developing and refining incident response procedures and playbooks.
· Generate reports on security incidents, trends, and recommendations for management review.
· Participate in ongoing training and professional development to enhance cybersecurity skills and knowledge.
· Contribute to the enhancement of SOC processes, tools, and technologies to improve overall efficiency.
Unique Skills/Tasks/Software:
· Required:
o Proficiency in using Splunk Enterprise Security for monitoring and analysis of security events.
· Preferred:
o Familiarity with Microsoft Sentinel for cloud-based security operations.
Certifications (Preferred):
· GIAC Continuous Monitoring Certification (GMON)
· GIAC Certified Incident Handler (GCIH)
· GIAC Certified Forensic Analyst (GCFA)
· GIAC Certified Intrusion Analyst (GCIA)
· GIAC Network Forensic Analyst (GNFA)
· GIAC Cloud Threat Detection (GCTD)
· GIAC Cloud Forensics Responder (GCFR)
Qualifications:
· Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
· Relevant experience (typically 3-5 years) in cybersecurity analysis or a similar role within a SOC environment.
· Strong analytical and problem-solving skills, with the ability to prioritize tasks in a fast-paced environment.