Description
Description
SAIC is seeking a Cybersecurity Analyst to support the Orange County Security Operations Center in Santa Ana, CA. The position will be responsible for Monitoring, Alerting, Responding and Reporting cyber threats that target County of Orange assets, systems, and data. Cyber services provided are associated with (but not limited to) endpoint and email security, firewall management, and Incident Response. The position will be Hybrid (some days onsite, some days remote working from home) with the Orange County Security Operations Center at 1400 South Grand Avenue, Santa Ana, CA 92705. The position is subject to routine changes to schedule (Moving from Midnight, Swings or Day Shift) with reasonable notice.
The Cybersecurity Analyst will be responsible for but not limited to the following:
- Proactively monitor security events for networks and systems.
- Identify, investigate, and report on potential Security Incidents.
- Support risk and vulnerability assessment at the network, system, and application level.
- Support cyber metrics development, maintenance, and reporting.
- Support cyber threat intelligence development and reporting.
- Support routine identification, development and implementation of automation tasks.
- Helps develop and implement security controls and formulate operational risk mitigations along with assisting in security awareness programs.
- Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
- Researches, evaluates, and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy.
- Utilizes COTS/GOTS and custom tools and processes/procedures to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions.
- Assists in the implementation of the required government policy (i.e., NIST), and makes recommendations on process tailoring.
- Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards.
- Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed.
- May provide briefings to senior staff.
Qualifications
Required Education:
- Bachelor's degree and zero (0) years' experience; additional four (4) years' experience can be considered in lieu of degree.
Required Clearance:
- There is no required security clearance; US Citizenship required.
Required Skills:
- Programming languages such as Python, C++, Javascript
- Security Information and Event Management (SIEM) technologies
- IDS/IPS, Firewalls, and Anti-Virus/Anti-Malware technologies
- Incident Response
- Vulnerability Management
- Experience in analyzing security alerts via MS Sentinel Security Information and Event Management (SIEM) (experience with other SIEM tools would be acceptable).
- Timely responses to email security alerts in O365 and Proofpoint, and Endpoint Detection and Response (EDR) system alerts in CrowdStrike.
- Working knowledge of the full Incident Response cycle: Identification, Protection, Detection, Response, Recover.
- Adherence to Standard Operating Procedures for the SOC.
Desired Certifications:
- Security+, GIAC Security Essentials (GSEC), or similar industry related certification(s).
Apply on company website