Rackspace Cyber Security Analyst in San Antonio, Texas
Overview & Responsibilities
We are open to various Rackspace locations, including office locations in London and San Antonio, TX. First Shift role.
Supervise monitoring of security events and alerts received from ISOC security tools. Manage end user reported incidents. Responsible for the first line of security incident response within the Rackspace ISOC. Hunt for suspicious activity based on anomalous activity and indicators of compromise from various intelligence feeds and toolsets. Serve as the technical escalation point and mentor for lower-level analysts. Provide communication and escalation throughout an incident per the ISOC Standard Operating Procedures. Report potential and actual security violations and provide recommendations. Communicate directly with end users and asset owners. Perform in-depth analysis of log files, systems, and network traffic. Maintain a strong awareness of the current threat landscape. Create knowledge base articles for handling low severity incidents.
Strong knowledge and understanding of network protocols and devices. Experience in intrusion analysis and incident response. Strong experience with Mac OS, Windows, and Unix systems. Demonstrable problem solving, analytical skills and attention to detail. Strong verbal and written communication skills. Packet and log analysis. Ability to handle high pressure situations in a productive and professional manner. Document and conform to processes related to security monitoring. Provide incident investigation, handling, and response to include incident documentation. Strong time management, skills with the ability to multitask. Ability to work a flexible work schedule, including weekends. Provide training and mentorship to lower-level security analysts. Provide tuning recommendations for security tools to tool administrators. Provide tuning recommendations for security tools to tool administrators.
Strong knowledge of the following:
Network Monitoring Tools
Case Management System
Web Security Gateway
Data Loss Prevention
Network Access Control
Bachelor’s degree in Computer Science or equivalent combination of education and experience required.
GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred.
2-4 years of experience in a security operations center (SOC) environment required.
Experience with SIEM (i.e. Arcsight, QRadar) Sourcefire, FireEye, Snort or an equivalent tool required.
Basic system administration skills.
Experience with reviewing raw log files, data correlation, and analysis (ie. System logs, netflow, firewall, IDS) required.
Req # 39653
Category Cyber Security