Conducts daily traffic analysis, identifies and characterizes anomalous activity. Performs in-depth system and network forensics to identify and eradicate threats. Characterizes and analyzes network traffic to identify anomalous activity and potential threats to network resources. Generates incident reports, investigates suspicious network and system activity. Performs cyber defense trend analysis and reporting. Determines tactics, techniques, and procedures (TTPs) for intrusion sets. Reconstructs a malicious attack or activity based off network traffic. Proactively identifies threats to the enterprise, initiates the distribution of enterprise-wide alerts. Coordinates with enterprise-wide cyber defense staff to validate network alerts. Provides timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguishes these incidents and events from benign activities. Monitors software patches, security fixes, and tests and validates modified systems. Performs security reviews and identifies security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy. Recommends computing environment vulnerability corrections. Processes, documents, and coordinates resolution of cyber incidents with appropriate teams. Notifies designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulates the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan. This position provides coverage to the Central AZSOC for swing shifts and covering weekend hours working in North Phoenix.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Senior
Education Level
No Education Listed
Number of Employees
1-10 employees