Threat Investigation Analyst
Company: Sentinel Technologies
Category: IT
Downers Grove
Type: Full Time
Sentinel is seeking a Threat Investigation Analyst to join their team. The Threat Investigation Analyst will be responsible for shadowing more experienced analysts learning to triage, investigate, and escalate triggered security alerts to protect computer systems, networks and data. They will also be responsible for communicating technical security information to involved stakeholders across all levels of technical expertise. They are expected to stay up to date on the latest intelligence, including adversary methodologies to anticipate and identify security breaches and compromises, in addition, they are responsible for providing complete and accurate analyses of security alerts and effectively communicate to stakeholders with the guidance of more senior analysts.
Hours: Monday – Friday 4:30PM – 1:00AM CST. Compensation range: $60,000-$80,000 annually. They offer benefits including: Medical, Dental, Vision, 401K, 529, Life Insurance, Income Protection Short and Long-Term Disability, Medical and Child/Elder Care, Flexible Spending Account Plans, Family Planning Benefits, Financial Education, Identity Theft Protection and Assistance, Legal Services, Employee Assistance Program, Two weeks’ vacation, additional paid time-off for Personal and Sick, certification and hands-on training, and employee discount for product services and entertainment.
Qualifications:
- 0-2 years’ experience in a security related position.
- Certifications preferred: Â CCNA, Security+, CEH and/or CC.
- A GIAC certification preferred.
- Experience performing daily system monitoring and health checks for various security products.
- Confident triaging alerts and reports of incidents.
- Confident analyzing real traffic and associated artifacts: malicious, normal, and application traffic; and demonstrate the ability to differentiate malicious traffic from false positives.
- Configuring firewalls, data encryption, and other security measures.
- Understanding of how DNS works for both legitimate and malicious purposes.
- The candidate must meet and uphold CJIS requirements.
- Understanding basic network protocols and traffic flow in an enterprise environment.
- The ability to communicate clearly with verbal and written skills.
- Staying current on IT security trends, vulnerabilities, and news and recommending security enhancements.