Security Operations Analyst

Company Name:
Client is seeking an experienced Security Analyst to join our client's security operations team, which provides 24x7 security monitoring, problem resolution, and incident response for their enterprise. The chosen candidate will join the Security Information and Event Management (SIEM) team supporting a new event management and collection tool (QRadar). The team provides services for a variety of platforms such as LINUX servers, Firewalls, Proxy Servers, IP phone systems, IDS, Antivirus, authentication based event logs, application firewalls, Windows servers and workstations.
This position also includes the following expectations: Follow established procedures, use tracking tools, documentation tools, and a knowledge database to document, resolve or escalate incidents within established guidelines.
The person chosen to fill this opening will be training in the usage of the QRadar tool and the specific configuration and operations protocols established by our client. After training, the person in this role will be expected to contribute to the development of processes and procedures for the SEIM team and will support the client's daily operating needs including working with business partners to identify, develop and implement new data collection of event details for security correlation and alert functions.
Desired Skills include:
- Must have a solid experience working within an Enterprise security group with defined processes and procedures
- Experienced with Linux operating systems and an ability to navigate and search log files, create custom shell scripts
- Shell scripting experience with awk, grep, sed, and Perl.
- Experience with syslog technologies (i.e. syslog-ng, rsyslog, Snare and SIEM technologies)
- Experience customizing syslog-ng filters based on key words, host names and destination paths
- Experience with QRadar or other SIEM tools
- Knowledge of security industry best practices, log collection and log management

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

SOC Security Operations Analyst
Northbrook, IL Request Technology, LLC
Security Operations Analyst
Lake Forest, IL Request Technology, LLC
Security Operations Analyst
Lake Forest, IL Request Technology, LLC
Security Operations Center (SOC) Analyst
Bloomington, IL State Farm Mutual Automobile Insurance Com...
Security Operations Center (SOC) Analyst
Bloomington, IL State Farm Insurance
Senior Analyst - Cyber Security Operations
Chicago, IL Hyatt