Cyber Security Analyst

at The Judge Group
Location The Colony, TX
Date Posted November 11, 2021
Category Default
Job Type Full-time


Location: The Colony, TX

This position is with the Cyber Security Défense Team that operates for 24/7 in order to mitigate any cyber security attacks.
The resource will be responsible for monitoring and investigating the incoming alerts as well as responding to them, these alerts may arrive at any point of time, that is the alerts arises 24/7.
This resource needs to have strong Cyber Security experience.
They will be encountering attacks such as Brute-Force Attacks, etc.
This is a potential contract to hire/full time position.

Top skills –
Cyber Security OR Security Operations experience
Willing to work as per the given rotating shift hours
Experience with log aggregation tools, such as – Splunk 

Looking for an experienced security operations center (SOC) analyst.
2+ years’ experience.
SOC analyst skill levels are often listed as level 1 (entry), level 2 (intermediate), level 3(advanced).
We are looking for either candidates who currently have level 2/3 skills and experience or high potential level 1 candidates.
The manager would prefer candidates having college degree or equivalent experience.  They don't want college degree as a requirement because, by doing so, we might miss qualified candidates 

In this role, you will support the 24/7 Cyber Fusion Center by monitoring and responding to alerts. This position conducts in-depth analysis of security events with the specific ability to identify Indicators of Compromise, perform intrusion and root cause analysis, and proactively take actions to mitigate potential damage to our cyber ecosystem.

Works in 24x7 Cyber Défense Center to provide monitoring and detection/response services
Detects and responds to security incidents by leveraging our detection/response platforms.
Triage security incidents and perform in depth analysis through the use of Cyber Threat Intelligence, intrusion detection systems, firewalls and other boundary protection devices.
Escalates cyber security events according to playbooks and standard operation procedures (SOPs).
Assists with containment and remediation of threats during incidents.
Uses internal ticketing system to track investigated incidents and capture relevant details.
Conducts threat hunting activities based on internal and external threat intelligence.
Performs triage of service requests from customers and internal teams.
Provides executive facing written updates and reports.
Provides executive facing written updates and reports.
Assists training junior team members

Ability to work various shifts supporting the 24x7 Cyber Fusion Center (our day shift is: 6am to 6pm, and the night shift is: 6pm to 6am as we run 24/7 SOC operation, and that includes on weekends as well. It will be 2 days off then 2-3 days on. Day and night shift would rotate every few months.)
2+ years of cyber security experience with the focus on Incident Response or Security Operations
BA/BS in Engineering, Computer Science, Information Security, or Information Systems or equivalent related work experience
Experience interfacing with internal and external customers providing remediation actions to non-technical audience
Working knowledge of an enterprise level security technologies such as SIEM and ticketing systems.
Willing to work in a highly collaborative environment with a focus on project delivery and desired business outcomes.

Experience with Splunk and other SIEM platforms, Enterprise Intrusion Prevention Systems, Endpoint Detection tools, and other security products
Experience supporting large scale incident investigations
Security certifications: Security+, CASP, GCFA, GCIH, GCFE.

Contact: [Click Here to Email Your Resumé]

This job and many more are available through The Judge Group. Find us on the web at
Drop files here browse files ...