Previous Job
Security Analyst
Ref No.: 17-00017
Location: San Jose, California
  • The candidate selected would work for 3rd shift i.e. starting from 10:00 PM to 8:00 AM
  • There are two working schedule
  • 2 positions for Sunday to Wednesday
  • 2 positions for Wednesday to Saturday
Once they are onboarded there will be initially a training and training would happen either in 1st shift or 2nd shift and once they are trained they will work for 3rd shift

Job Description
A Security Analyst participates in monitoring and response activities and is directly responsible for responding to security events. He/She provides a front line during security incidents, establishing the extent of the threat, business impacts and then advising and performing the most suitable course of action to contain and remedy the incident. A Security Analyst maintains a good knowledge of the threat landscape, helps enhance current capabilities and provides support in the identification of new methods of detecting threats. He/She performs initial analysis and triage of security events using analytical skills and advanced knowledge of IT security and network threats.

This position will participate in a shift schedule. The position works a "4 10s” schedule, which is 10 hours a day 4 days a week. Open shifts are Sun-Wed. This shift schedule results in four days on and three days off every week.

Minimum two years of IT security experience or 4 years of related college degree
Excellent oral and written communication skills
Ability to be on-call on a recurring basis
Ability to take initiative and ownership of incidents from reporting to resolution
Ability to understand business impact

Responsible for taking action on alerts, events, and incidents.
Triages incidents, their priority and the need for escalation.
Investigates potential escalations regarding various attack types
Monitoring for emerging threat patterns and vulnerabilities.
Assists with patching recommendations and workarounds for zero-day threats.
Coordinates with other external stakeholders.
Communicates with management on incident updates.
Able to run down an incident from start to finish if low to medium priority without supervision.

Skills and Experience
Experienced in performing basic- and medium-level forensic analysis on Windows and UNIX systems.
Identify and evaluate malware-related compromise artifacts.
Possesses understanding of the areas of network systems engineering, computing systems and software applications.
Demonstrates prior experience using network analysis tools, scripting languages including UNIX command line utilities, software vulnerabilities, exploits and malware.
Experience working in a high volume and results-oriented operational environment.
Ability to mitigate command and control attempts by recommending defensive technology configurations.
Interacting with vendors to support proof of concepts.

One or more of the following certifications:
GIAC Security Essentials (GSEC)
GIAC Certified Intrusion Analyst (GCIA)
EC-Council Certified Ethical Hacker (CEH)
Systems Security Certified Practitioner (SSCP)