Thursday, February 26, 2015

Dell posted a job you might be interested in



Dell



Security Analysis Advisor

San Francisco Bay Area, US - Computer Hardware, Computer Software, Information Technology and Services

Job Description



Dell Services Federal Government is looking for a tech savvy Security Analysis Advisor to join a high performing Security team. This person will help to support the mission of the customer and provide outstanding and detailed security support. The perfect candidate will analyze security alerts for a large Federal customer in the Mountain View, CA area. The Security Analysis will work on information security problems that are diverse and highly complex. The right candidate will have proven experience with selecting methods and techniques for identifying and advocating effective security solutions. The Analyst will develop approaches to address critical information security issues. Develop and administer schedules and performance requirements.



Responsibilities:

* Monitor agency sensors and SOC (Security Operations Center) systems for incidents and malicious activity

* Analyze security events and identify relevant incidents

* Correlate and discover relationships between seemingly unrelated events and incidents

* Generate high quality reports

* Perform packet analysis and analyze network traffic for security events

* Coordinate with both Tier 1 and Tier 3 teams while providing incident handling and response support for the agency

* Contribute to process improvement and efficiency



Work schedule is swing shift, 4 x 10 hours - 12:00pm to 10:00pm (approx). "djam"""



Required Skills



* Experience reviewing and analyzing large amounts of raw log data (firewall, network flows, IDS, system logs)

* Experience with well known information security related tools such as Wireshark, Kali, Netcat, TCPDump and NMAP

* Knowledge of common attack methodologies, tactics and protocols

* Familiarity in a command line environment in all operating systems

* Possess a strong foundation in networking fundamentals with deeper knowledge of TCP/IP and other core protocols

* Knowledge of common network based services and common client/server applications

* Excellent communication and interpersonal skills

* Track record of being motivated to learn and thrive on challenges

* Commitment to Excellent; Thirst for Knowledge

* Ability to work in a 24/7/365 shift environment

* Ability to obtain a government clearance (US Citizenship is required)



Desired Skills



* Experience working in a mission critical security operations team, preferably 24x7

* Experience with enterprise level security incident event management tools such as ArcSight or Splunk

* Scripting (Python, Perl or Shell)



Education



BS degree in relevant field/technology

CEH, Security+, GIAC are desired certifications



Experience



Typically requires at least 8 years relevant experience without a Degree; 3+ years relevant experience with Undergraduate Degree; 2+ years relevant experience with Graduate Degree



Requirements



Hazards



No salary provided



Posted February 26, 2015 at 03:44AM from LinkedIn http://ift.tt/1anAzSz

via IFTTT

No comments:

Post a Comment