Ingalls Information Security is a specialized, Louisiana-based cybersecurity company with a mission to prevent and respond to data security breaches. We have responded to some of the largest data breaches in history and we provide consulting services to state and federal government, non-profit organizations, and financial institutions in the energy, finance, defense, and high-technology industries. Additionally, we have been engaged by clients to secure high-profile Information Technology projects that utilize Open Source Software.
Ingalls Information Security's experience in resolving data breaches provides the expertise and perspective that has led to our success in testing, training, and engineering preventative services such as audits, penetration testing, and social engineering awareness training. The highest levels of government, corporate, and non-profit organizations engage our firm to perform discreet, effective threat mitigation, and vulnerability remediation.
Job Description
The cybersecurity analyst/engineer is responsible for maintaining and developing the information systems used to support the Ingalls Security Operations Center including networks, systems, applications, platforms, databases, and operating procedures. Ingalls takes a DevOps approach to its SOC: Applicants can expect to both perform SOC duties, such as security event analysis, and to support development and integration efforts for SOC tools and technologies. The cybersecurity analyst/engineer shall assist in breach response, network monitoring, tool deployment, tool development, and systems integration.
The Security Operations Center (SOC) team prevents and responds to data security breaches and identify areas that are vulnerable to cyber-attacks. Some of the duties of the SOC team are as follows but not limited to:
- Incident Response
- Penetration Testing
- Malware Analysis and Reverse Engineering
- Digital Forensics
- Research and Development
- Tier I/II/III Security Monitoring
- Client engagements such as weekly calls to provide ticket and event status to customer
- Perform other related duties as required and assigned
SOC Analysts should be familiar with computer networking (TCP/IP), Windows, Linux, and Cisco operating systems and information security; Intrusion Detection Systems (IDS) and SIEM technologies. ArcSight ESM, Splunk, McAfee NSM, antivirus, and Firewall experience preferred. Analysts should have knowledge and experience with scripting and programming (Python, PERL, etc.).
SOC Analyst must be able to communicate effectively with clients and all levels of the organization, be organized and have great time management skills.
Qualifications
Proficient in and with a minimum of 2 years' experience in at least 2 of the following:
- Python or comparable scripting language
- Anaconda, Pandas, Matplotlib, and other data science/visualization libraries
- DevOps Principles: CI/CD, Automated Provisioning, Unit Testing
- No-SQL databases (Elastic or Mongo)
- SQL databases (Postgres preferred)
- Cloud platforms (AWS preferred)
- Networking basics (routing, firewall administration, TCP/IP stack)
Additional Information
This position can be remote and regionally based depending on market and opportunities. Office setting, travel that requires computer usage, customer interface, network building through professional communication.
All your information will be kept confidential according to EEO guidelines.