want to join an elite group that accelerates innovation? Start here.

Tell SkillStorm about yourself and what you want to achieve in your career. Then we’ll let you know if your next step is becoming a tried-and-true Stormer.

Q

Interested in Hiring Exceptional Tech Talent?

Start here

Q

Interested in Hiring Exceptional Tech Talent?

Start here



want to join an elite group that accelerates innovation?

Start here



Q

Accelerate Your Career

Whether you’re a college graduate, military veteran, or an experienced pro, we can train you, we can upskill you, we can put you to work.

We are storming the marketplace with the highly skilled, experienced, and certified professionals that businesses need.

Find your perfect job.

Sr. Security Threat Analyst

The Senior IT Security Threat Analyst independently develops, maintains, and implements comprehensive information security monitoring, controls assessment, intelligence, and threat hunting programs including defining cyber operations security policies, processes and standards for large and complex environments. Sr. Analyst directly performs comprehensive threat analysis and recommends appropriate course of action, mitigation, and remediation. Sr. Analyst provides consultative guidance on the development of information security strategies and programs through demonstrated expertise and knowledge of industry trends and changes with respect to advanced and sophisticated cyberattacks and threats. Sr. Analyst leads efforts, oversee work results, provides formal or in-formal training and serves as a technical resource for Information Security team members and non-Information Security groups. Sr. Analyst serves as key cyber operations technical contact and handling of coordination for third-party incident response teams and law enforcement agencies if the environment is breached. Accountabilities may include, but not be limited to network and application technical security assessment, offensive security and adversary attack simulation, penetration testing, security event monitoring, threat detection, threat modelling, threat hunting, participating in and intelligence channels engagement and monitoring, and translating actionable intelligence to countermeasures enactment. Role requires hands on technical and security work related activities. Role requires hands on technical and security work related activities in addition to strong interpersonal, written and oral communication skills.

Essential Functions:
• The essential functions listed represent the major duties of this role, additional duties may be assigned.
• Independently, proactively and automatically correlates and analyzes threat data from various sources and analyzes network events to establish the identity and modus operandi of malicious users active in the computing environment or posing potential threats to the computing environment. Provides guidance and assistance to junior members of the team
• Independently conducts industry research and technical evaluation of all-sources and vendor supplied intelligence--with specific emphasis on network operations and advanced and sophisticated cyber tactics, techniques, and procedures
• Subject matter expert in the detection and identification of cyberattack signatures, tactics, techniques and procedures associated with advanced threats
• Leads assessments and development of cyber threat profiles of current events based on collection, research and analysis of open source information
• Leads root cause analysis of any monitoring alerts and threats identified by third-party vendor, or internal systems and workforce. Once root cause is determined, proposes and leads cross-departmental efforts, if required, to implement appropriate security controls and solutions that will mitigate risk and vulnerabilities, as well as safeguard our systems and data
• Independently and proactively prepares detailed technical papers, presentations, recommendations, and findings for Management and other Technology Leaders
• Develops and maintains documentation for security monitoring procedures and security diagrams
• Leads the development of proposed design, configuration, and implementation of security monitoring architecture
• Serve as a subject matter expert for team members, specializing in network security monitoring, host analysis, and log analysis
• Creates and leads initiatives to improve security monitoring operations center processes
• Leads improvements discussions with third-party vendor regarding security monitoring functions
• Proactively identifies company-wide program opportunities and works to implement solutions. Guides the direction of the overall information security monitoring and threat analysis program

Required Work Experience:

6+ years direct IT Security work experience. Specific expert level technical experience may be substituted

Required Education:

Related Bachelor’s degree or demonstrated equivalent professional training and work experience

Additional Required Qualifications:
Experience with securing cloud security architectures and deployment models.
Understanding of MS365 (Teams) deployments with emphasis on security testing and operational monitoring.
Demonstrated proficiencies in emerging technologies.
Strong technical knowledge of security architecture, tools and controls with specific demonstrated experience in proactive detection, mitigation, and resolution of advanced cyberattacks and/or threats
Strong technical knowledge of security infrastructure including security firewalls, data loss prevention, encryption, and end point protection appliances
In-depth knowledge of information threat analysis and detection concepts and principles and impact
Experience working and managing vendor performance and service level agreements
Proven leadership abilities including effective knowledge sharing, conflict resolution, facilitation of open discussions, fairness and displaying appropriate levels of assertiveness.
Proven ability to work under stress in emergencies with flexibility to handle multiple high-pressure situations simultaneously.
Ability to communicate highly complex technical information clearly and articulately for all levels and audiences.
Ability to manage tasks independently and take ownership of responsibilities
Ability to learn from mistakes and apply constructive feedback to improve performance
Strong customer focus with ability to manage customer expectations and experience and build long-term relationships.
Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel.
Ability to adapt to a rapidly changing environment and quickly identify new trends and industry changes specific to security and advanced cyberattacks
High critical thinking skills required to evaluate complex, multi-sourced security intelligence information, analyze and confirm root cause, an independently identify mitigation alternatives and solutions that safeguard our technical environment.
Preferred Licenses and Certifications
CISS, CEH, CISM, CRISC, OSCP, etc.

Additional Preferred Qualifications:

•3 + years of Threat Analysis and Modelling, Cyber Operations experience including, but not limited to investigations, threat hunting, and incident response and/or Cyber Offensive Security (Red Team Adversarial Attack Simulation) experience.
•Experience using Agile methodology

#LI-DNI

Similar Jobs

Sr. Security Threat Analyst

Contract job in Jacksonville

Security Architect

Contract job in Jacksonville

Federal Contracts Capture Manager

Direct Hire job in Jacksonville

Sr. Systems Engineer

Contract job in Jacksonville

Sr. Hadoop Developer

Contract job in Jacksonville

Sr. Hadoop Architect

Contract job in Jacksonville

Data Analyst

Contract job in Jacksonville

Sr. Java Developer

Contract job in Jacksonville

Sr. React/Node .JS Developer

Contract job in Jacksonville

Job Application for
Sr. Security Threat Analyst

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Join the Stormer Community and prepare to advance