8 days old

Information Security Analyst

Carmel, IN 46032
  • Job Code

Protect Company's information assets against emerging cyber threats and gather threat intelligence which feeds from both internal and external sources. Understand the relevant threat landscape, tie threats to the likely exploits, and then integrate and prioritize the information into Company's cyber defense framework, to include detection capabilities using multiple open-source and commercial tools. Additionally, provide proactive threat modeling, kill-chain mapping, and system baselining.


  • Utilize multiple advanced analytical techniques such as decision analysis, the scientific method, and machine learning to analyze and visualize anomalies. Use this information to generate multiple detection options and approaches while considering how the solution may change or affect the organization.
  • Analyze relevant cyber security event data for attack indicators and breaches that may yield detection or prevention content.
  • Collect, consolidate, research, analyze, and correlate internal (firewalls, network devices, servers, databases, applications) and external threat intelligence to detect anomalies.
  • Participate in root cause analysis of critical events for improving preventative and reactive processes.
  • Responsible for reporting, escalating, and remediating anomalous events based on established procedures.
  • Participate as part of a Cyber Security Incident Response Team following established procedures to resolve security events.
  • Respond to high-urgency and high-severity threat indicators by communicating actionable information, guidance, and other relevant information for stakeholders.
  • Assist with analysis, development, and implementation of processes, procedures, and tools to enable Cyber Threat Hunting.
  • Develop and use standard operating procedures that implement cyber security best practices and threat intelligence to enhance enterprise security posture.
  • Establish and cultivate relationships with individuals, organizations, and threat-centric communities in the computer security and threat intelligence field to promote the appropriate exchange of threat intelligence, threat feeds, and response activities.
  • Maintain knowledge of adversary activities, including intrusion set tactics, techniques and procedures (TTP) to mitigate organizational risk.
  • Prepare reports and communicate results on immediate threats and associated risks to keep management aware of threats.
  • Recommend security countermeasures and controls based on threat research to mitigate information security risk.

Appropriate level will be based on knowledge and experience


  • Bachelor's degree in Computer Science, Applied Mathematics, Statistics, Data Science, or related field, or a minimum of 6 years relevant work experience
  • At least two years of related IT security experience
  • Possess foundational understanding of IT concepts and principles
  • Expert level knowledge in one or more IT areas: networking, programming, systems (Microsoft/Linux/Unix), reverse engineering of malware, computer forensics, databases


  • Working with security intelligence and security analytics
  • Analyze log data from various systems to correlate intelligence information with network behavior
  • Knowledge of attacker tactics, techniques, and procedures (TTPs)
  • Translating network telemetry to information security posture
  • Ability to provide network traffic (PCAP) and NetFlow analysis, working knowledge of TCP/IP
  • Experience performing network forensics
  • Maintain familiarity with multiple operating systems in order to analyze malware static and dynamic behavior
  • Collect and analyze digital artifacts to identify and resolve cyber security incidents
  • Working with security infrastructure technologies
  • Identifying and developing threat signatures from all available sources
  • Leading programs and projects with emphasis in security technologies
  • Experience processing and analyzing large amounts of data, using multiple tools (Nmap, Wireshark, Zmap, Splunk, SIEMs, etc.)
  • Experience responding to and managing security incidents as a member of a CERT
  • Strong understanding of any of the following: firewalls, IDS/IPS, proxies, SIEMs, programming, statistics
  • Excellent problem solving skills
  • Critical thinking and detail-oriented focus
  • Analytical mind combined with a creative curiosity to discover
  • SQL and database architectures, as well as queries
  • Programming experience is a plus
  • Computer forensics and reverse engineering malware is a plus
  • Applied mathematics, statistics, and data science is a plus
  • Ability to work a 24x7 on-call schedule


  • Information Technology

Randstad utilizes a technology-driven focus with a human touch to provide better staffing and business solutions to organizations around the world. Our team of experts match professionals with available career opportunities in a variety of fields.

Featured Jobs

Career News

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Information Security Analyst

Randstad Technologies
Carmel, IN 46032

Share this job

Information Security Analyst

Randstad Technologies
Carmel, In

Separate email addresses with commas

Enter valid email address for sender.

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast