Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
Job Title: Information Security Operations Center - Incident Handler IIILocation: Washington, DCDuration: 12+ Months
Essential Job Functions
Monitor Security Events from IDS, SIEM, etc.Log tickets to the Ticketing SystemHandle calls from the MSSP (Managed Security Service Provider) & users regarding incidents/events, perform triage, resolve problems, or escalate to team membersPerform triage on alerts from all sources including monitored email distribution listsParticipate in rotating weekly shift supporting off hours and weekend activity (24x7)Produce ad hoc reports and other ad hoc tasksQualifications
Required Skills/Abilities:
Monitoring skills related to IDS and SIEMUnderstanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 conceptsUnderstanding of Windows Registry, File system, etc.Hands-on knowledge of Network Packet Analysis using toolsAbility to work with team members with varying levels of technical skills and diverse international backgroundsStrong understanding of Networking and Operating systems conceptsAbility to adapt to and function in a project environment with multiple timetables and changing prioritiesAbility to learn new concepts and approaches in analyzing Security IncidentsGood communication skills (Verbal and Written)Educational Qualifications and Experience:
Education: Bachelor's degree in Computer Science or Information SystemsRole Specific Experience: 2+ years of relevant experience in Information Security Incident HandlingExperience with Firewalls and information security technologiesExperience with CERT/CSIRT/CIRT/SOCCertification Requirements:Any two certifications would be a plus: CEH, Security +, CCNA
Additional Responsibilities
Response activities, including containment, remediation, and root cause analysisBachelor's degree and 5+ years of information security experienceExperience in malware remediation and containmentHands-on experience of Incident Response/Malware analysisAdvanced Responsibilities
Perform advanced Malware Analysis, along with Incident ResponseGenerate detailed Malware Analysis reports on PE and other common file structure samplesProvide actionable intelligence and suggestions for control updates based on reverse engineering and malware analysisAssist OIS in identifying zero-day/vulnerable applications and impactExperience Matrix for Levels:
Level I - 2+ years of experienceLevel II - 5+ years of experienceLevel III - 7+ years of experienceNote:The specific shift he wants to get covered is the 12pm-8pm EST window. Strong experience in SOC environment and great soft skills/customer service required. Candidates must be able to attend an in-person interview.
#J-18808-Ljbffr