SCRUFF
Company Description
MindPoint Group delivers industry-leading cybersecurity solutions, services, and products. We are trusted cybersecurity advisors to key government and commercial decision-makers and support security operations for some of the most security-conscious organizations globally.
Our relationship with you is for the long run because your success is our success. We invest in your success through fantastic benefits (healthcare, generous PTO, paid parental leave, and tuition reimbursement, to name a few).
Beyond just excellent pay and benefits, you’ll want to work here for reasons that can’t be written into an offer letter—the challenge, growth opportunities, and most important: the culture of a company that cares about you.
A position at MPG promises you
- A diverse organization
- A safe workplace with zero tolerance for discrimination or harassment of any kind
- A balanced work life. Seriously.
- A stable, established, and growing business
- A leadership team focused on your professional growth and development
Job Description
MindPoint Group is seeking a Junior Cybersecurity Incident Response Analyst to support threat monitoring, detection, event analysis, and incident reporting. The Security Operations Center is a 24/7 environment but is not shift work. They will be responsible for monitoring enterprise networks and systems, detecting events, and reporting on all threats that are directed against those systems regardless of their classification level or type. The Junior Cybersecurity Incident Response Analyst is expected to collaborate with leadership to develop metrics based on situational awareness and threat monitoring at an enterprise level.
Typically, the client’s sensor grid acquires thousands of events per day and events are analyzed and categorized in accordance with the Cyber Security Incident Response Plan. The Junior Cybersecurity Incident Response Analyst will provide the client with a fully comprehensive array of analytical activities in support of external threat monitoring, detection, event analysis, and incident reporting efforts to include: presentation reviews, internal and external threat reporting, analysis of inbound and outbound public internet traffic, suspicious e-mail messages, communicate and coordinate the characterization of events and the response.
The Junior Cybersecurity Incident Response Analyst shall orient their skill sets to the following tools (this is not a complete inventory):
- Splunk SIEM
- Swimlane
- Bluecoat
- Sourcefire (Snort)
- VMRay
- Vulnerability MGMT tools such as Qualys
The Junior Cybersecurity Incident Response Analyst shall:
- Provide support for computer and network exploitation and defense techniques to include deterring, identifying, and investigating computer and network intrusions
- Provide incident response and remediation support
- Perform comprehensive computer surveillance/monitoring, and identify vulnerabilities
- Utilize Vulnerability Management (VM) tools to provide VM reports to the CISO team.
- Provide technical support for continuous monitoring, computer exploitation and reconnaissance; target mapping and profiling; and network decoy and deception operations in support of computer intrusion defense operations
- Provide technical support for forensics services to include evidence seizure, computer forensic analysis, and data recovery, in support of computer crime investigation
- Research and maintain proficiency in open and closed source computer exploitation tools, attack techniques, procedures, and trends
- Perform research into emerging threat sources and develops threat profiles
- Provide technical support for a comprehensive risk management program identifying mission-critical processes and systems; current and projected threats; and system vulnerabilities.
- Document processes for utilizing tools within the environment.
Qualifications
- US Citizenship and the ability to get a Public Trust Required
- Minimum of four (4) years of general work experience and at least two (2) years of relevant experience in functional responsibility.
- Bachelor’s Degree, or an equivalent combination of formal education, experience.
- Strong analytical and organizational skills.
- Concise writing skills, excellent MS Word skills as well as other MS Office Applications
- Strong verbal communication skills.
- Experience with securing various environments preferred.
- Experience working in a SOC and performing incident response is preferred.
- Experience and education preferred in CEH, eCPPT, OSCP, GCFW, GCIH, other relevant IT security certifications, or advanced vendor certifications such as Splunk Certified Architect or SourceFire Certified Administrator; Security+, Network+, GSEC, or other relevant IT security product certifications such as, Certified Systems Analyst, or SnortCP CISSP, CISM, or ISO 27001
Additional Information
- All your information will be kept confidential according to EEO guidelines
- Equal Opportunity Employer Veterans/Disabled