Security Operations Analyst
Scripps Networks Interactive
Knoxville, TNThis was removed by the employer on 8/1/2017 8:23:00 AM PST
Not to worry we have many other jobs on the site;
Browse all jobs
Browse the IS/IT Category
Search for Security Operations Analyst jobs in Knoxville-TN
Search all Security Operations Analyst postings
Full Time Job
Scripps Networks Interactive, the leader in lifestyle media with top brands such as HGTV, Food Network, and Travel Channel, is searching for a Security Operations Analyst.
The Security analyst working in the Operational Control Center (OCC) is an important member of the Global Information Security team in SNI. The Analyst will help to develop and implements security processes, procedures, and guidelines for multiple platforms and diverse systems environments. The SA position administers and maintains on/off premise services critical to the business. The role wall interface with offshore resources and 3rd party support. This position requires previous experience in related IT security fields or IT type call centers. The role required critical thinking skills to identify the right people to engage to resolve problems or incidents.
Job Description:
Not familiar with Knoxville?
Many people know Knoxville as the heart of Vol Country, but it's also been named Top 100 Best Places to Live, Forbes' Best Places for Careers, Forbes' Most Affordable Cities, Huffington Post's Top 10 Places to Relocate to in the US and more.
YOUR OPPORTUNITY
Duties and Responsibilities
• Reviews the performance, availability, and capacity of internally and externally hosted services and service components against service SLAs and OLAs.
• Works with technology teams to ensure that systems and services are configured for monitoring, alerting and reporting appropriately.
• Triages incidents and escalates quickly to the correct group.
• Documents standard practices and step-by-step procedures.
• Interfaces professionally and accurately with stakeholders when incidents occur.
• Facilitates communications across technical, stakeholder and management groups during incidents.
• Provides support on network security issues and responds in accordance with the Security Incident Management Plan. Receives guidance from senior staff.
• Reports, investigates as appropriate, and recommends corrective actions for data security incidents. Monitoring and analyzing network traffic, Intrusion Detection Systems (IDS), security events and logs;
• Prioritizing and differentiating between potential intrusion attempts and false alarms.
• Creating and tracking security investigations to resolution.
• Composing security alert notifications and other communications.
• Advising incident responders in the steps to take to investigate and resolve computer security incidents.
• Staying up to date with current vulnerabilities, attacks, and countermeasures.
• This position requires the ability to work a shift schedule.
The ideal candidate should be able to multitask and give equal attention to a variety of functions
Education
& Experience
Education:
associates/Bachelor's degree in Computer Science or Information Systems is desired.
Minimum of 2 years Experience with processes, tools, techniques and practices for assuring
adherence to standards associated with accessing, altering and protecting organizational data.
Minimum of 2 years of information security related experience, in areas such as: security operations, incident analysis, incident handling, and vulnerability management or testing, system patching, log analysis, intrusion detection, or firewall administration.
Security Certifications Preferred (Including but not limited to the following certifications):
- Certified Incident Handler (GCIH)
- Certified Intrusion Analyst (GIAC)
- Certified Ethical hacker (CEH)
- Certified Expert penetration tester (CEPT)
- CISSP
- Networking Certifications (CCNA, etc)
Knowledge Skills & Abilities
A candidate must be an effective communicator:
A candidates must have:
Extensive Systems Engineering / Administration Linux and MS Windows support experience Considerable scripting and/or programming experience Network Experience – certification preferred Skilled in Problem Solving and Troubleshooting
Computer/Technical
Moderate to Advanced event analysis leveraging SIEM tools (Qradar preferred)
Moderate incident investigation and response skill set
Moderate log parsing and analysis skill set
Moderate knowledge of networking fundamentals (TCP / IP, network layers, Ethernet, ARP, etc)
Moderate knowledge of malware operation and indicators
Moderate knowledge of current threat landscape (threat actors, APT, cyber-crime, etc)
Moderate knowledge or IDS / IPS systems
Moderate knowledge of Windows and Unix or Linux
Moderate knowledge of Firewall and Proxy technology
Basic to Moderate knowledge of penetration techniques
Basic to Moderate knowledge of DDoS mitigation techniques
Basic knowledge of Data Loss Prevention monitoring
Basic experience with scripting
Basic knowledge of forensic techniques
Basic to Moderate protocol analysis experience (Wireshark, Gigastor, Netwitness, etc.)
Basic knowledge of audit requirements (PCI, HIPPA, SOX, etc.)
Experienced in mentoring and training junior analysts