Network Security Monitoring Analyst Information Technology (IT) - Philadelphia, PA at Geebo

Network Security Monitoring Analyst

An enterprise financial organization is looking for a Security Analyst to support their Security Detection & Response group. In this position you will be handling incident tickets (L1/L2), providing support & security recommendations directly to users, handling malware analysis, and making recommendations for rules & detection tuning. Prior experience in a similar environment (Cyber Security Operations Center, network security team, etc) is a plus, along with core tools including SIEM, IDS/IPS, vulnerability scanners, and any scripting language(s). This is a hybrid position ( 2 days per week) in the Philadelphia/South jersey area 6-12 months contract-to-hire Required Skills & Experience 2
Years of Information Security Desired Skills & Experience Work with relevant tools (SIEM, IDS/IPS, etc) Relevant degrees or certifications What You Will Be Doing Tech Breakdown 85% Security Operations 15% misc. Security responsibilities Daily Responsibilities 80% Hands On 20% Team Collaboration Network Security Monitoring Analyst Recommended Skills Finance Network Security Vulnerability Scanners Computer Security Security Information And Event Management Scripting Apply to this job. Think you're the perfect candidate? Apply on company site $('.external-apply-email-saved').on('click', function (event) window.ExternalApply = window.open('/interstitial?jobdid=j3t1ll674rl4dkxb0vd', 'ExternalApply-j3t1ll674rl4dkxb0vd'); ); $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.