What are the responsibilities and job description for the Security Analyst position at Onepath?
About 1Path
Our company foundation is built on Integrity, Excellence, Accountability and Teamwork. These four core values support our vision and shape our culture. We live by them every day, measure our success, and continually grow. At 1path we want our employees to have fulfilling careers and we commit to our employees by offering competitive benefits, compensation, and development opportunities. If you want to be an integral part of a rapidly growing, cutting-edge technology company huge growth potential, 1Path is the one choice for you.
About the Role
We are seeking a Security Analyst to join our Security Operations Center team! This is an entry level position with plenty of room for growth! The Security Analyst is responsible for the investigation and remediation of security events generated by 1Path’s stack of Network Security and Endpoint Threat Detection tools. The Security Analyst identifies and reports any major vulnerabilities identified via alerting within client environments to the client support teams so threats can be addressed quickly and proactively. Our ideal Security Analyst has a passion for Cybersecurity and personal growth, is always willing to share security best practices with their colleagues, and exhibits Integrity, Excellence, Accountability, and Teamwork every step of the way!
Job Description
- Monitor computer network for security issues
- Investigate security measures and operate software to protect systems and information infrastructure
- Deploy and support managed security services for 1Path customers
- Fix detected vulnerabilities to maintain a high security standard
- Help colleagues install security software and understand information security management
- Research security enhancements and make recommendations to management
- Stay up to date on Information Technology trends and security standards.
- Fulfill compliance audit requests and insurance related audits.
- Manage SOC tool Vendor Relationships
- Assist Product Lifecycle Management team with vetting potential tools
- Handle escalated alerts from IDS/Log manager systems including brute force
- Create deployments for managed security services, phishing campaigns
- Provisioning, deployment, support, and subject matter expert of all managed security services for a multitude of clients including advanced endpoint protection
- SIEM/log management, phish training/simulation, DNS filtering, MFA setup
Soft Skill Requirements
- Good customer service skills
- Strong interpersonal skills and a willingness to work with others
- Ability to work through a variety of methods including mail, Microsoft Teams, telephone, and face-to-face
- Excellent verbal & written communication skills
- Strong analytical, evaluative, and problem-solving abilities with ability to multitask in fast-paced environment
- Hunger to learn and grow one’s skillset
- Ability to diligently create and maintain clear and concise documentation
- Ability to clearly relay technical data to non-technical individuals
- Proven ability to work successfully with limited supervision
- Strong critical thinking skills
- Resourceful (not afraid to Google when the answer is not readily apparent!)
- Experience with ticketing systems a strong plus!
Technical Requirements
- Basic Linux CLI skills
- Basic Windows admin/support skills (basic command line tools, directory navigation, Windows Server systems, etc.)
- Understanding of Windows file systems, grasp of Linux file systems
-
Strong understanding of IPv4 Networking including:
- How web calls are initiated, GET vs POST, etc.
- Client/Server connections/relationships using TCP/IP
- Understanding of common ports/services and ability to identify several common services based on port number (SMTP, HTTP/S, SSH, Telnet, LDAP, RDP, etc.)
- Understanding of the concept behind basic cyber-attack methods (brute force/password spray, rainbow table hashing, SQL injection, social engineering/phishing, DOS/DDOS, etc.)
- Basic understanding of common security controls (SMTP threat protection, firewall controls, load balancer, DNS filtering, IDS/IPS products, Endpoint-Detection/Response tools, patch control, encryption controls, hashing, etc.)
- Knowledge of SSO, firewalls, next generation AV
Bonus Technical Skills
Basic scripting skills (PowerShell, Python, Bash, Perl, etc.)
- Basic/thorough understanding of SQL & database systems
- Exceptional Linux admin skills
-
Basic understanding of cloud computing systems and models (SaaS, PaaS, IaaS, Private vs Public vs Hybrid, etc.)
- Ability to identify/understand proprietary cloud tools (e.g. Amazon/AWS Elasticbeanstalk, S3, Azure Bastion, etc.)
- Understanding of offensive security/”hacking” tools (vulnerability scanners, password crackers, port scanners, Nmap, Burpsuite, etc.)
Preferred Qualifications
- Technology related Bachelor’s or Associates degree OR
- 1 years related IT experience
- Industry relevant certifications such as: CompTIA Security , CompTIA CySA