N

Cybersecurity Analyst (Mid)

NexThreat
Full-time
On-site
Clarksburg, West Virginia, United States
Job Title:Cybersecurity Analyst (Mid)
Location: NCR or Clarksburg
Job Category: Information Technology   
Time Type: Full-time
Clearance Requirement: Current TS/SCI Clearance required
Security Suitability: Must pass FBI security suitability
Polygraph Requirement: Must pass an FBI administered Counterintelligence polygraph if one has not been conducted within the last five years.
Employee Type: W2 or 1099
Citizenship: US Citizen, no Dual Citizenship
 
Summary:
NexThreat is seeking Cybersecurity Analyst (Mid). The Mid-Level Cybersecurity Analyst is an integral part of the Watch Floor Team within the Security Operations Center (SOC). This team operates around the clock, 24/7, 365 days a year, ensuring the timely detection and resolution of potential security incidents. By minimizing the impact of cyber threats, the team plays a crucial role in safeguarding the confidentiality, integrity, and availability of the organization’s information assets. The Mid-Level Analyst is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats.

Key Responsibilities:
·       Monitor security events and alerts using industry-standard tools to identify potential threats and vulnerabilities.
·       Analyze and investigate security incidents, documenting findings and recommending remediation steps.
·       Collaborate with the Watch Floor Team to ensure efficient incident detection and response.
·       Assist in developing and refining incident response procedures and playbooks.
·       Generate reports on security incidents, trends, and recommendations for management review.
·       Participate in ongoing training and professional development to enhance cybersecurity skills and knowledge.
·       Contribute to the enhancement of SOC processes, tools, and technologies to improve overall efficiency.

Unique Skills/Tasks/Software:
·       Required:
o   Proficiency in using Splunk Enterprise Security for monitoring and analysis of security events.
·       Preferred:
o   Familiarity with Microsoft Sentinel for cloud-based security operations.
Certifications (Preferred):
·       GIAC Continuous Monitoring Certification (GMON)
·       GIAC Certified Incident Handler (GCIH)
·       GIAC Certified Forensic Analyst (GCFA)
·       GIAC Certified Intrusion Analyst (GCIA)
·       GIAC Network Forensic Analyst (GNFA)
·       GIAC Cloud Threat Detection (GCTD)
·       GIAC Cloud Forensics Responder (GCFR)
Qualifications:
·       Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
·       Relevant experience (typically 3-5 years) in cybersecurity analysis or a similar role within a SOC environment.
·       Strong analytical and problem-solving skills, with the ability to prioritize tasks in a fast-paced environment.