IT Security Associate

L3Harris
||
Melbourne, FL
Apply HereJob ExpiredView all Jobs
L3Harris

IT Security Associate

Melbourne, FL
SOC / Threat Intel
FULL-TIME
Jun 2

L3Harris is searching for talented entry level Information Technology (IT) Security professionals to join the L3Harris Security Operations Team as a Security Analyst. This is a Level 1 IT Security position that is staffed in the Security Operations Control Center (SOCC). Accordingly, applicants must be willing to work rotating shifts in a 24x7x365 environment. Please refer to the job description provided below.

  • Responsible for Tier 1 security configuration hardening, incident detection and reporting
  • Monitors security events to identify anomalies and possible incidents within the network
  • Manages SIEM front-end including workflow management, threat hunting assignments, threat intelligence ingests, rule/alert creation and maintenance
  • Uses developed skills, tools, and external resources to validate those events as valid or false positive
  • Performs historical analysis of logs associated with security events
  • Produces well-written reports outlining incident and potential mitigation
  • Mines data from various sources looking for anomalous activity
  • Communicates with teammates about potential incidents and trend
  • Troubleshoots VPN sessions / issues
  • Handles trouble calls from customers and users
  • Applies baseline security configurations to network equipment
  • Works with other teams to troubleshoot network-related issues
  • Shift work required in 24x7x365 environment
    • This includes working Holidays and weekends as part of the shift
  • Must be able to provide on-call support as needed
  • Must be able to work in a fast-paced ever-changing environment

    QUALIFICATIONS: 
    • 0-2 years related experience with BS/BA (Bachelors) in Information Technology/Computer Information Systems or Cyber/Information Security; or 4+ years related experience with 2 years post-Secondary/AA-AS Degree; or 8+ years related experience with No Degree
    • Understanding of various Operating Systems
    • Understanding of system logs and be familiar with log analysis
    • Understanding of cyber-attack vectors (Buffer Overflow, Phishing, etc.)
    •  
    •  
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here. Cyberlinx does not own the logos from employers or jobs posts