Job Title: Sr. Cyber Defense Analyst
Location: Lexington, KY
Type: Hybrid (1-2 days per week onsite)
Duration: 6+ Month Contract
Pay: $65 - $85/hr (depending on years of experience)
Description:
Cyber Defense Analysis
- Firewall exception management - integrate systems into a zero-trust network architecture across on-prem and cloud environments
- Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
Vulnerability Assessment and Management
- Analyze the organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
- Conduct required reviews as appropriate within the environment.
- Perform technical (evaluation of technology) and non-technical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, and supporting infrastructure).
Incident Response
- Coordinate with and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
- Perform analysis of log files from various sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system logs) to identify possible threats to network security.
- Perform cyber defense incident triage, which includes determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation.
Skill Sets Required:
- BS required or equivalent experience
- Security certification required (e.g. CISSP)
- Other IT industry certifications are highly desirable
- 5+ years in information security
- Ability to produce clean, concise diagrams and documentation
Skill Sets Preferred:
- Experience in network protocol analysis, log analysis, perimeter security technologies
- Experience with Microsoft Security solutions, Qualys, Splunk, Crowdstrike, Palo Alto, and Cisco firewalls