Job Directory Security Operations Analyst II

Security Operations Analyst II
Fort Worth, TX

Companies like
are looking for tech talent like you.

On Hired, employers apply to you with up-front salaries.
Sign up to start matching for free.


Job Description


The Security Operations Analyst II represents a mid-level level position for a career in Information Assurance and Security at the ESA, LLC Fort Worth Operations Site. The position is under the direct supervision of the Chief Information Security Officer.

The Security Operations Analyst II is a member of the information security team and works closely with other members of the team to assist in the development and implementation of a comprehensive information security program. This role is primarily responsible for operational security tasks such as vulnerability management, log monitoring and analysis, and incident response.


Responsibilities & Tasks:

* Analyze potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach.
* Perform network incident investigations, determining the cause of the security incident and preserving evidence for potential legal action.
* Monitor and correlate security event log information to identify and detect anomalous activity.
* Initiate escalation procedure to counteract potential threats/vulnerabilities.
* Document and conform to processes related to security monitoring, patching and incident response.
* Appropriately inform and advise management on incidents and incident prevention.
* Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; assisting with the development of training programs.
* Participate in knowledge sharing with other analysts and develop solutions efficiently.
* Perform enterprise security platform operation & maintenance.
* Gather intelligence on, characterize, and track threat actors' activities, ranging from tactical (targeted) level capabilities to global operations.
* Correlate collected intelligence, in order to build upon a larger knowledge base of tracked threat activity.
* Prepare system security reports by collecting, analyzing, and summarizing data and trends.


Minimum Qualifications:

Education (Highest Level Required/Preferred):

Bachelor degree required.

Training Pre-requisites (Within One Year of Taking Position):


þ Safety Training, as dictated by Safety Department

þ Other: DoD 8570.01-M IAT Level II certification (see list below)

Certifications/Licenses: (DoD 8570.01 IAT Level II certification)

Preferred: DoD 8570.01-M IAT Level II certification (i.e., CompTIA Security+, GSEC, SCNP or SSCP)

Experience Required:

Functional (Using Skill Set): 3-5 years

Management: 3-5 years

Industry: 3-5 years

Knowledge, Skills, Abilities Required (Unique and Measurable):

* Bachelor's degree in Computer Science or 3-5 years equivalent IT work experience.
* Detailed understating of network defense practices
* Detailed knowledge of National Institute of Standards and Technology (e.g. NIST SP 800-53 Rev. 4, NISP SP 800-171) compliance standards, controls and remediation technologies, solutions and processes.
* Knowledge of system security design and defense-in-depth concepts
* Ability to communicate technical security information to non-technical personnel
* 3-5 years of Information Security experience
* Knowledge of information security practices, principles, and tools
* Ability to obtain a government clearance (US Citizenship is required)

Desired Skills

* Knowledge of common L4-L7 protocols such as SSL, HTTP, DNS, SMTP and IPsec
* Knowledge of TCP/IP, computer networking, routing, switching and packet analysis tools
* Strong understanding of Microsoft Windows endpoint (XP, 7, 8, 10) system administration capabilities.
* Proficient understanding of Microsoft Windows Server (2003, 2008, 2012) system administration capabilities.
* Experience using high-level programming languages (i.e., C++, Python, MS PowerShell) to automate system administration tasks.
* Fundamental knowledge of industry standard information security tools (i.e., Wireshark, Kali Linux, TCP Dump, NMAP).

Let your dream job find you.

Sign up to start matching with top companies. It’s fast and free.