Beta
NextResu.me
Upload a resume screenshot or PDF/Word file.
File size can not exceed 5M
Resume optimization.
The first 1,000 reservations can experience for free.
✔ subscribed
Job information
Deadline Date: Tuesday 3 October 2023 Requirement: First Line Security Event Analyst (FLSEA) Location: Mons, BE Full time on-site: Yes Time On-Site: 100% Not to Exceed Rate: 97 EUR Total Scope of the request (hours): 159 Required Start Date: 20 November 2023 End Contract Date: 31 December 2023 Required Security Clearance: NATO SECRET Duties and Role: As a First Line Security Event Analyst (FLSEA), the incumbent will perform initial analysis of logs and network traffic, determine alert severity and escalate when required. The analyst will collate information and present findings in a clear, structured format, providing remediation recommendations and first line response where applicable. Main responsibilities: Conduct research and assessments of security events within NATO Cyber Security Centre (NCSC)team Provide analysis of firewall, IDS, anti-virus and other network sensor produced events and present findings Appropriately leverage the comprehensive extended toolset (e.g. Log Collection, Intrusion Detection, Packet Capture, VA, Network Devices etc.) for enhancing investigations Support the end-to-end Incident Handling process Propose optimisations and enhancements which help to both maintain and improve NATO's Cyber Security posture RequirementsSkill, Knowledge & Experience: The candidate must have a currently active NATO SECRET security clearance A university degree in a technical subject with a focus on Information Technology (IT), obtained from a nationally recognised/certified institution in addition to a minimum of 1 year experience in the field of cyber security analysis. The lack of a degree may be compensated by at least 3 years of relevant experience in field of cyber security analysis. Similarly, candidate's lacking experience can compensate by demonstrating a high level of knowledge in the field of cybersecurity. Comprehensive knowledge of the principles of computer and communications security including knowledge of TCP/IP networking, Windows and Linux operating systems Broad understanding of common network security threats and mitigation techniques Experience in Security Information and Event Management products (SIEM) – e.g. ArcSight, Splunk Experience in Analysis of Network Based Intrusion Detection Systems (NIDS) events– e.g. SourceFire, Palo Alto Network Threat Prevention Experience in Log analysis from a variety of sources (e.g. Firewalls, Proxies, Routers, DNS and other security appliances) Experience in Network traffic capture analysis using Wireshark Logical approach to analysis and ability to perform structured security investigations using large, complex data sets Good written and spoken communication skills Ability to work independently and as part of a team Desirable Holding industry leading certification in the area of cyber security such as GCIA, GNFA, GCIH Computer Incident Response Centre (CIRT), Computer Emergency Response Team (CERT) Proficiency in Intrusion/Incident Detection and Handling Experience in Full Packet Capture systems – e.g. Niksun, RSA/NetWitness Experience in Host Based Intrusion Detection Systems (HIDS) Experience in Computer security tools (Vulnerability Assessment, Anti-virus, Protocol Analysis, Anti-Virus, Protocol Analysis, Anti-Spyware, etc.) Experience in Computer forensics tools (stand alone, online and network) Experience in Military communication systems and networks
Generate
Enter the job description and your resume,
To get your personalized interview questions
Remaining fish crackers: --
|
Login