Cybersecurity Analyst

4 weeks ago


Bloomfield Hills, United States CareerBuilder Full time

Cybersecurity Analyst

MUST reside in Michigan and work onsite full-time. NOT eligible for relocation

This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.

ESSENTIAL DUTIES AND RESPONSIBILITIES:
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
Use cyber defense tools for continual monitoring and analysis of the system to identify malicious activity.
Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
Receive and analyze network alerts from various sources within the enterprise and determine probable causes of such alerts.
Perform cyber defense trend analysis and reporting.
Coordinate with enterprise-wide cyber defense staff to validate network alerts.
Identify and analyze anomalies in network traffic using metadata.
Provide daily summary reports of network events and activity relevant to cyber defense practices.
Identify applications and operating systems of a network device based on network traffic.
Be accessible via company phone and email 24/7 in case of emergency.

CORE SKILLS AND KNOWLEDGE:
Ability to apply cybersecurity, privacy principles, computer networking concepts and protocols, and network security methodologies to assess and counter potential threats before they occur.
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
Knowledge of cyber defense and information security policies, procedures, and regulations.
Knowledge of the common attack vectors on the network layer.
Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
Skill in collecting data from a variety of cyber defense resources.
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITILv4]).
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of network traffic analysis methods.
Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation sponsored).
Knowledge of cyber defense and vulnerability assessment tools and their capabilities.
Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
Knowledge of how to use network analysis tools to identify vulnerabilities.
Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
Skill in performing packet-level analysis.

QUALIFICATIONS, CERTIFICATIONS, EDUCATION, EXPERIENCE:
5+ years experience in identifying, detecting, and combating active and potential cybersecurity threats in a SOC/NOC environment.
Recommended Certifications: Security+, CSSP Analyst, CCNP Security, Server Platform
Certifications (Microsoft, Linux), Cloud Security Certifications are a plus
Ability to interact with a wide variety of individual personalities constructively and professionally.
Interface with security analysts from government and non-government entities to conduct joint cyber security mitigation activities.
Excellent problem-solving skills.
Effective communication and interpersonal skills while interacting with users on a layman level.
Demonstrate honesty, integrity, and respect for others, while being flexible and open to change.
Ability to interact with a wide variety of individual personalities constructively and professionally.

A minimum requirement for this position is the ability to work legally in the United States. No visa sponsorship/support is available for this position

In addition, NO C2C or 3rd parties please

Join Our Team

At NuTechs, we are always looking for talented IT Professionals to meet the needs of our employer partners. Whether you are looking for a short term project or a long term opportunity, we are here to help.

If you specialize in the areas below, please submit your resume:

Application DevelopmentSoftware & Application IntegrationDatabase Development & AdministrationNetwork & Infrastructure Design | Systems AdministrationHelp Desk ServicesERP ImplementationWeb Development

Why Choose NuTechs? NuTechs is EMPLOYEE friendly

NuTechs is a diversified technical recruiting firm and our passion is helping our client building exceptional teams, and assisting candidates with educated career moves. We take time to understand what is important to our clients and candidates as they build their teams and careers. After all, a happy candidate leads to a happy client.
#J-18808-Ljbffr



  • Auburn Hills, United States Comerica Full time

    Location: Hybrid - Auburn Hills, MI Virtual/ RemoteAnticipated Start Date: 2024Our Technology & Cybersecurity Interns work on active projects and directly impact and influence project outcomes, as well as identify and recommend enhancements to existing processes/procedures. After successful completion of the Technology & Cybersecurity Summer Internship...


  • Auburn Hills, United States Comerica Full time

    Location: Hybrid - Auburn Hills, MI Virtual/ RemoteAnticipated Start Date: 2024Our Technology & Cybersecurity Interns work on active projects and directly impact and influence project outcomes, as well as identify and recommend enhancements to existing processes/procedures. After successful completion of the Technology & Cybersecurity Summer Internship...


  • Auburn Hills, United States ALTA IT Services Full time

    Job DescriptionJob DescriptionAMS (APPLICATION MANAGEMENT SYSTEM) SUPPORT ANALYST – Automotive IndustryLocation: US-MI-Auburn Hills – 3 days a week onsite ALTA IT Services has a 6-month contract to hire opening for an AMS (Application Management System) Support Analyst to join one of our leading integrator customers. The role will collaborate with a...


  • Farmington Hills, MI, United States Comerica Full time

    Business Unit Risk Change Management Risk Assessment Manager This position may be an individual contributor or may function as a team leader of a small group responsible for assessing the operational risk of their business unit. This position provides insight and direction relative to gaps in controls along with regular reporting to management reflecting...


  • Farmington Hills, MI, United States Comerica Full time

    Business Unit Risk Change Management Risk Assessment Manager This position may be an individual contributor or may function as a team leader of a small group responsible for assessing the operational risk of their business unit. This position provides insight and direction relative to gaps in controls along with regular reporting to management reflecting...