Monday, March 23, 2015

Dell posted a job you might be interested in



Dell



SOC Network Analyst Advisor

San Francisco Bay Area, US - Computer Hardware, Computer Software, Information Technology and Services

Job Description



Dell Services Federal Government is looking for a tech savvy Security Analyst Advisor to join a high performing Security team. This person will help to support the mission of the customer and provide outstanding and detailed security support. The perfect candidate will analyze security alerts for a large Federal customer in the Mountain View, CA area. The Security Analyst will work on information security problems that are diverse and highly complex. The right candidate will have proven experience with selecting methods and techniques for identifying and advocating effective security solutions. The Analyst will develop approaches to address critical information security issues. Develop and administer schedules and performance requirements.



Responsibilities:

* Monitor agency sensors and SOC (Security Operations Center) systems for incidents and malicious activity

* Analyze security events and identify relevant incidents

* Correlate and discover relationships between seemingly unrelated events and incidents

* Generate high quality reports

* Perform packet analysis and analyze network traffic for security events

* Coordinate with both Tier 1 and Tier 3 teams while providing incident handling and response support for the agency

* Contribute to process improvement and efficiency



Work schedule is swing shift, 4 x 10 hours - 12:00pm to 10:00pm (approx). "djam"""



Required Skills



* Experience reviewing and analyzing large amounts of raw log data (firewall, network flows, IDS, system logs)

* Experience with well known information security related tools such as Wireshark, Kali, Netcat, TCPDump and NMAP

* Knowledge of common attack methodologies, tactics and protocols

* Familiarity in a command line environment in all operating systems

* Possess a strong foundation in networking fundamentals with deeper knowledge of TCP/IP and other core protocols

* Knowledge of common network based services and common client/server applications

* Excellent communication and interpersonal skills

* Track record of being motivated to learn and thrive on challenges

* Commitment to Excellent; Thirst for Knowledge

* Ability to work in a 24/7/365 shift environment

* Ability to obtain a government clearance (US Citizenship is required)



Desired Skills



* Experience working in a mission critical security operations team, preferably 24x7

* Experience with enterprise level security incident event management tools such as ArcSight or Splunk

* Scripting (Python, Perl or Shell)



Education



BS degree in relevant field/technology

CEH, Security+, GIAC are desired certifications



Experience



Typically requires at least 8 years relevant experience without a Degree; 3+ years relevant experience with Undergraduate Degree; 2+ years relevant experience with Graduate Degree



Requirements



Mobility to work in a typical office setting, use standard office equipment including a computer and keyboard; vision to read printed materials, correspondence and a computer screen; strength and mobility for standing, walking, sitting, stooping, kneeling, crouching, crawling, reaching, retrieving.



Hazards



none



No salary provided



Posted March 13, 2015 at 09:08AM from LinkedIn http://ift.tt/1B7yL6F

via IFTTT

No comments:

Post a Comment