Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Job Description
Insight Global is Looking for a Tier 2 security Operations Analyst in Vancouver or Seattle for a hybrid 6-month contract with a high possibility for extension or conversion to permanent. The Cyber Security Analyst will help the team to perform Security Operations Center (SOC) duties, which include incident response, malware analysis, and monitoring. This role will work with the team to implement processes and practices designed to protect networks, devices, and data from malicious attack, damage, or unauthorized access.
• Triages alerts/incidents and performs deep analysis; correlates with threat intelligence tools, tactics and procedures (TTP) in indicators of compromise (IOCs) to identify the threat actor, nature of the attack, and systems or data affected.
• Prioritizes and triages alerts or issues to determine whether a real security incident is taking place and escalate incidents to Tier 3 if remediation cannot be closed within SLA time.
• Performs analysis, triage and remediation of low/medium priority alerts.
• Analyzing logs, network traffic, and other data sources to identify the source of incidents.
• Record identified vulnerabilities, create remediation tickets and track their status.
• Build internal scripts, tools, and automation processes to enhance detection and response capabilities.
• Adjusting security tools and processes, e.g. EDR alerting modifications, updating detection rules conditions, etc.
Required Skills & Experience
• Bachelor’s in: Computer Science, Information Security, Cybersecurity, or a related degree.
• 3+ year experience in one or more areas: Security Operations, Incident Response, Information Security Technology, etc.
• Strong security concepts of threat categories (such as malware, phishing attacks, Defense-in-Depth, MITRE ATT&CK framework, etc.)
• Strong knowledge of M365 Security tools, Azure, AWS, GCP
• Working experiences to security tools such as SIEM (Sentinel, Splunk, Elastic etc.), EDR, firewalls, IDS/IPS, anti-spam, content management, server and network device hardening, etc.
• Strong knowledge of Windows, Linux and/or Mac OS and comfortable with looking at, understanding, and investigating Security Event logs.
• Good knowledge of networking protocols (SMTP, HTTP, HTTPS, FTP, DNS, DHCP, etc).
• Experiences of any query language and scripting language
• SharePoint, Excel, JIRA and/or Microsoft Office skills
• Experience in using security orchestration, automation, and response tools
• Experience with query languages and scripting languages
• Experience in using security orchestration, automation, and response tools
Key Skills
Ranked by relevanceReady to apply?
Join Insight Global and take your career to the next level!
Application takes less than 5 minutes

