Cybersecurity Analyst

Calista CorporationHuntsville, AL
1d

About The Position

We are seeking a motivated and skilled Cybersecurity Analyst with a minimum of 2 years of professional experience to join our cybersecurity team. The ideal candidate will be responsible for monitoring, analyzing, and responding to security incidents and threats. This position requires a proactive individual who can effectively contribute to our team’s mission of safeguarding our organization's information systems against cyber threats. The day-to-day duties typically balance proactive defense with reactive incident response: Continuous Monitoring: Use the Microsoft tool stack: Sentinel, Purview, and Defender to monitor networks, servers, and endpoints for suspicious activity or unauthorized access. Incident Response: As a key member of the Incident Response team, investigate security alerts, lead the containment of breaches, and documenting the "how" and "why" of an attack to prevent recurrence. Vulnerability Management: Conduct regular vulnerability assessments to identify and patch system weaknesses before they can be exploited. Security Configuration: Confirm firewalls, data encryption programs, and antivirus software are installed per policy and are configured properly to minimize attack surfaces. Reporting & Compliance: Author technical reports for stakeholders and ensuring the organization meets industry-standard regulations; NIST 800-171 and CMMC L2

Requirements

  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field.
  • Minimum of 2 years of experience in cybersecurity, with a focus on incident response and threat analysis.
  • Familiarity with security information and event management (SIEM) systems, intrusion detection/prevention systems(IDS/IPS), and endpoint security.
  • Understanding of network protocols, operating systems, and security architectures.
  • Strong analytical and problem-solving skills, with a keen eye for detail.
  • Excellent communication skills, both written and verbal.
  • Active DOD Secret clearance with the ability to upgrade to Top Secret with SCI eligibility.

Nice To Haves

  • Thorough understanding of the RMF, A&A, and ATO processes is desired.
  • Certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or GIAC Security Essentials (GSEC) are a plus.
  • Experienced working with cross-functional teams to include engineering, IT, and manufacturing.

Responsibilities

  • Continuous Monitoring: Use the Microsoft tool stack: Sentinel, Purview, and Defender to monitor networks, servers, and endpoints for suspicious activity or unauthorized access.
  • Incident Response: As a key member of the Incident Response team, investigate security alerts, lead the containment of breaches, and documenting the "how" and "why" of an attack to prevent recurrence.
  • Vulnerability Management: Conduct regular vulnerability assessments to identify and patch system weaknesses before they can be exploited.
  • Security Configuration: Confirm firewalls, data encryption programs, and antivirus software are installed per policy and are configured properly to minimize attack surfaces.
  • Reporting & Compliance: Author technical reports for stakeholders and ensuring the organization meets industry-standard regulations; NIST 800-171 and CMMC L2
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service