Overview

Associate Cybersecurity Analyst Jobs in Oregon, Illinois, USA at DOT Security

Title: Associate Cybersecurity Analyst

Company: DOT Security

Location: Oregon, Illinois, USA

Type: Full Time

Category: IT/Tech, Security

Location: Oregon

DOT Security’s mission is to improve the security posture of client organizations by providing detection, response, risk management, and compliance services as identified and required. DOT Security will implement processes, technology, and subject matter expert personnel to monitor and respond to client needs in the cybersecurity and compliance space. Working with client organizations, DOT Security will continuously measure and improve internal processes and technology, which will translate to improved services provided to the client.

DOT Security is seeking team members who are passionate about Cybersecurity, detail-oriented, desire forcontinuous learning, and enjoy working in acollaborative environment. We provide our employees with acareer progressionpath that challenges our team to grow as cybersecurity professionals with strong cybersecurity skills. As a member of Dot Security, you will get the opportunity to work from a brand-new, state-of-the-art Security Operations Center (SOC) facility.

What you will be doing:

As an Associate Cybersecurity Analyst, you’ll be on the front lines of defense, working with a highly motivated team that is focused on analyzing, developing, and delivering solutions to stop adversaries. You will be responsible for diligently working on alerts from various defensive security systems/tools (e.g. IDS alerts, firewall, and network logs) to analyze and determine if the alerts represent a threat.

What Do Cybersecurity Analysts Do? | A Day in the Life

Responsibilities

Monitor and analyze real-time alerts from our SIEM and other security tools to determine possible causes of such alerts.

Evaluate and investigate network traffic, read, interpret logs, and packet captures.

Provide timely detection, investigation, identification, and alerting of possible attacks/intrusions, anomalous activities, misuse activities and distinguish these incidents and events from benign activities.

Document investigation and analysis actions to effectively communicate information to both internal and external stakeholders.

Evaluate and escalate events and incidents based on established escalation procedures, playbooks, etc.

Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.

Investigate phishing emails.

Things We Are Looking For

Strongcritical thinkingandproblem-solving skills.

Strong written and verbalcommunication skillswith the ability to effectively communicate to non-technical stakeholders.

Knowledge of current threats and vulnerabilities.

Familiarity with MITRE ATT&CK framework.

Understanding of Information Technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, virtual private networks, encryption).

Understanding of traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge on authentication, authorization, and access control methods.

Understanding of defense-in-depth principles and network security architecture.

Knowledge of network protocols such as TCP/IP,DynamicHost Configuration, Domain Name System (DNS), and directory services.

Knowledge of Windows/Unix ports and services.

Education

Bachelor’s degree in Computer Science, Information Security, In…

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.