Information Security Analyst - Temporary

AchieveTempe, AZ
Hybrid

About The Position

As an Information Security Analyst (SOC Analyst) - Temporary , you will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats and incidents. You will work as part of a team in a fast-paced environment to ensure the security and integrity of our organization's systems and data. This is a temporary assignment that we expect will go through the end of 2026. There is potential for conversion from temporary to full time in 2027.

Requirements

  • 3 + years of experience as a SOC Analyst
  • Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field preferred. Relevant certifications (e.g., CompTIA Security+, SANS GIAC) may be considered in place of formal education.
  • Proven Mitre ATT&CK implementation capabilities - familiar with detection engineering principles and practices
  • Technical Skills: Basic understanding of networking concepts, operating systems, and cybersecurity principles. Familiarity with common security tools and technologies is a plus.
  • Analytical Skills: Strong analytical and problem-solving skills with the ability to quickly analyze and interpret security event data.
  • Communication Skills: Excellent written and verbal communication skills with the ability to effectively communicate technical information to both technical and non-technical audiences.
  • Team Player: Ability to work collaboratively as part of a team in a dynamic and fast-paced environment.
  • Attention to Detail: Strong attention to detail and the ability to accurately document security incidents and related information.

Nice To Haves

  • Certifications: Relevant certifications such as CompTIA Security+, Cybersecurity Analyst CySA+, or Certified Ethical Hacker (CEH) are a plus.

Responsibilities

  • Monitor Security Alerts: Monitor security event and incident detection systems for potential security incidents or breaches.
  • Incident Triage: Analyze alerts and events to determine their nature, scope, and potential impact.
  • Investigation and Analysis: Conduct initial investigation and analysis of security incidents to determine root cause and potential mitigation strategies.
  • Escalation: Escalate security incidents to appropriate teams or individuals for further investigation or response.
  • Incident Response: Assist in coordinating and executing incident response activities, including containment, eradication, and recovery efforts.
  • Documentation: Document and maintain accurate records of security incidents, including timelines, actions taken, and lessons learned.
  • Threat Intelligence: Stay informed about current cybersecurity threats, vulnerabilities, and trends to enhance detection and response capabilities.
  • Security Tool Management: Assist in the maintenance and tuning of security tools and technologies, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection and Prevention Systems), and endpoint detection platforms.
  • Collaboration: Work closely with other members of the SOC team, as well as IT and cybersecurity teams, to effectively respond to security incidents and improve overall security posture.
  • Detection/Alerting - Use Mitre Att&ck to continue maturity on alerting across all platforms.

Benefits

  • 401 (k) with employer match
  • Medical, dental, and vision with HSA and FSA options
  • Competitive vacation and sick time off, as well as dedicated volunteer days
  • Access to wellness support through Employee Assistance Program, physical and mental health wellness programs
  • Pet care discounts for your furry family members
  • Financial support in times of hardship with our Achieve Care Fund
  • A safe place to connect and a commitment to diversity and inclusion through our six employee resource groups
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service