IT Security Analyst - Tier II Job at Berkley

Berkley Wilmington, DE 19809

Company Details:

BTS focuses on delivering the best service for our companies while also delivering outstanding help desk support and system connectivity. We pride ourselves on providing world-class operational support for our software applications. We continually upgrade our software applications to offer new features to our companies, making them more competitive in today’s insurance world.


The company is an equal opportunity employer.

Responsibilities:
The IT Security Analyst will require demonstrated leadership in directing and conducting research efforts, including prior experience as lead Investigator. We are looking for a strong background in computer/network security concepts and technologies, including extensive knowledge of enterprise security operations and computer network vulnerabilities and exploits.
#LI remote
Other key functions/duties/experience includes:

  • Experience writing technical reports and presenting results to leadership.
  • Identify deficiencies in security posture and develop, administer, and participate in action plans to address these gaps.
  • Facilitate effective communication between project/program stakeholders
  • Experience in managing large-sized projects/programs across multiple disciplines and/or teams.
  • Advanced-level understanding of business risk and how to properly advise a customer through critical situations
  • Strong team orientation, collaboration skills, and interpersonal skills
  • Adept at helping team members harness and develop strengths in pursuit of successful program outcomes
  • Proven problem-solving, critical thinking, and decision-making skills
  • Excellent interpersonal and communication skills, and proven ability to work effectively with all organizational levels
  • Conduct analysis of network traffic and host activity across a wide array of technologies and platforms Perform general SIEM monitoring, analysis, content development, and maintenance
  • Conduct and drive incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts
  • Compile detailed investigation and analysis reports for internal SOC consumption and delivery to leadership
  • Track threat actors and associated tactics, techniques, and procedures (TTPs) by capturing intelligence on threat actor TTPs and developing countermeasures in response to threat actors
  • Analyse malicious campaigns and evaluate the effectiveness of security technologies
  • Provide forensic analysis of network packet captures, DNS, proxy, Netflow, malware, host-based security and application logs, as well as logs from various types of security sensors
  • Conduct and provide computer forensic analysis of system memory and disk images
  • Coordinate threat hunting activities across the network, leveraging intelligence from multiple internal and external sources, as well as cutting-edge security technologies
  • Hunt for and identify threat actor groups and their techniques, tools, and processes
  • Identify gaps in IT infrastructure by mimicking an attacker's behaviours and responses
  • Provide analytic investigative support of large scale and complex security incidents
  • In depth understanding of cloud service providers (CSP) security offerings
  • Understanding of and ability to perform malware reverse engineering
  • Effective at utilizing sandbox technologies to detonate malware samples
Qualifications:

  • Strong understanding of Lockheed Martin’s Kill Chain
  • In depth knowledge of MITRE ATT&K matrix
  • Advanced understanding of networking concepts and ability to analyze network artifacts
  • Effective communication across technical silos
  • 3-5+ years of actual work-related experience in the field of Information Security
  • Experience with SIEM solutions (preferably Splunk or similar tool) search language, techniques, alerts, dashboards, report building, and creation of automated log correlations.
  • 8-10+ years of relevant cybersecurity experience in IT Security, Incident Response, or network security with a strong knowledge working in a SOC
  • The ability to write well and convey information to the intended audience in an easily understood manner
  • A bachelor's degree in Information Systems, Network Security, Computer Science or related IT-field is required.
  • Required Splunk Fundamentals I &II Training or Certification
  • One or more relevant industry cybersecurity certifications preferred (GCIA, GCIH, GREM, CEH, etc.)
  • After-hour work is required during any P1 incidents in addition to mandatory participation in the PIC process.
Additional Company Details: We do not accept unsolicited resumes from third party recruiting agencies or firms. The company offers a competitive compensation plan and robust benefits package for full time regular employees.



Please Note :
www.epokagency.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, www.epokagency.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, Site.com is the ideal place to find your next job.