Greetings,


My name is *Jay *and I am recruiter at *eTeam Inc*. eTeam Inc is a global
contingency staffing firm servicing fortune 1000 clients globally.We have
an excellent job opportunity with one of our client.





*Job Title: SOC Analyst*

*Location: Houston,TX *



Job Description:

*Job Title*: SOC Analyst
*Relevant Experience (Yrs)*: 5+ years SOC Analyst experience

*Technical/Functional Skills*: 5 years experience in Intelligence
collection, analysis, and reporting process/procedures


   - 2 years hands-on experience in the detection, response, mitigation,
   and/or reporting of cyber threats affecting client networks and one or more
   of the following:
   - Experience in computer intrusion analysis and incident response;
   - Intrusion detection;
   - Computer network surveillance/monitoring;
   - Knowledge and understanding of network protocols, network devices,
   multiple operating systems, and secure architectures;
   - Experience in computer evidence seizure, computer forensic analysis,
   and data recovery;
   - Computer network forensics.
   - System log analysis
   - Experience with current cyber threats and the associated tactics,
   techniques, and procedures used to infiltrate computer networks
   - Current experience with network intrusion detection and response
   operations (Protect, Defend, Respond and Sustain methodology)
   - Current experience with cyber threats and the associated tactics,
   techniques, and procedures used to infiltrate computer networks


*Roles & Responsibilities*:


   - Frequently analyse network and data security defensive posture
   - Participate in the design and implementation of proactive security
   controls
   - Examine technical data to assess security risk and posture
   - Participate in assigned activities during a cyber-security incident
   - Provide support to the in the detection, response, mitigation, and
   reporting of cyber threats affecting client networks
   - Maintain an understanding of the current vulnerabilities, response,
   and mitigation strategies used in cyber security operations
   - Produce reports and briefs to provide an accurate depiction of the
   current threat landscape and associated risk. Accomplish this through the
   use of customer, community, and open source reporting
   - Provide analysis for correlated information sources
   - Facilitate the customer's posturing itself to aggressively investigate
   cyber activity targeting customer information and its information
   infrastructure
   - Assist the customer training department in the education of staff on
   the cyber threat
   - Liaison with other government cyber threat analysis entities, such as
   intra-agency and inter-agency Cyber Threat Working Groups
   - Maintaining proficiency in the use and production of visualization
   charts, link analysis diagrams, and database queries
   - Analyze and report cyber threats as well as assist in deterring,
   identifying, monitoring, investigating and analyzing computer network
   intrusions .
   - Additional duties may include providing intrusion support to high
   technology investigations in the form of computer evidence seizure,
   computer forensic analysis, data recovery, and network assessments.
   - Meet and maintain customer required Information Assurance training
   compliance
   - Ability to read and understand system data including: security event
   logs, system and application logs
   - Experience managing and/or administering IDS/IPS systems, Firewalls,
   Web Proxy and full packet capture systems
   - Solid understanding of enterprise grade technologies including
   operating systems, databases, web applications, etc.
   - Solid understanding of computer architecture and file systems
   - Solid understanding of the core internet protocols (e.g., TCP/IP, DNS,
   SMTP, HTTP, etc) with a deep understanding of the OSI model
   - Aggressive attitude to solving problems and providing recommendations
   for business and process improvement
   - Organizational, interpersonal and team skills needed
   - Strong understanding of network routing and switching and TCP/IP
   - Strong working knowledge of the Linux Operating system
   - Good understanding of the Windows Operating system (desktop and server)
   - Ability to support and administer Security operations Center consoles.
   - Self-starter, able to work independently on security tasks
   - Good communication skills, ability to discuss security threats and
   risks to the team and other stakeholders


*Preferred Candidate*: CISSP or other security certifications
Experience with Lancope StealthWatch, LogLogic, Python, Splunk, CA Netflow
products, and Cisco ASA¿s is desired.





If you are qualified, available, interested, planning to make a change, or
know of a friend who might have the required qualifications and interest,
please call me ASAP at  (732) 248-1900 Ext.522 even if we have spoken
recently about a different position. If you do respond via e-mail please
include a daytime phone number so I can reach you.





Also, please take a few minutes to answer some of the questions below as
they will help me qualify your candidature





Full Legal Name as in Driving License/ Passport:

Preferred email ID:

Day/ Evening phone numbers:

Current Location:

Work Authorization:

Earliest availability for Phone/ On-Site interview:

Hourly Rate:

Earliest possible start date:

Two Professional References:



Also, be aware that our client conducts an extensive background checks on
candidates who are extended offers of employment.





*Sincerely yours,**
 *

*Jay Chauhan*

* *

*eTeam Inc*

*[email protected]*

*(732) 248-1900 Ext.522*

*1001 Durham Ave*

*South Plainfield, NJ, 07080*
.........................

Note: Please allow me to reiterate that I chose to contact you either
because your resume had been posted to one of the internet job sites to
which we subscribe, or you had previously submitted your resume to eTeam
Inc. I assumed that you are either looking for a new employment
opportunity, or you are interested in investigating the current job market.



If you are not currently seeking employment, or if you would prefer I
contact you at some later date, please indicate your date of availability
so that I may honor your request. In any event, I respectfully recommend
you continue to avail yourself to the employment options and job market
information we provide with our e-mail notices.


Thanks again.Jay

-- 
You received this message because you are subscribed to the Google Groups 
"Associate Programs" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/associate_programs.
For more options, visit https://groups.google.com/groups/opt_out.

Kirim email ke