Certified Woman & Minority Owned

Endpoint Detection & Response Specialist


Reference Number: NPIAID6

Endpoint Detection & Response Specialist
experience  Not Disclosed
location  100% Remote (Within US)
duration  1 Months
salary  Not Disclosed
jobtype  Not Disclosed
Industry  Government - State
duration  $29.82/hour - $34.82/hour
Job Description

Remote


Position Summary:
The client is seeking an experienced Security Operations Center (SOC) Analyst with strong expertise in Endpoint Detection and Response (EDR) tools and cyber-security incident handling. The ideal candidate will thrive in a fast-paced environment with aggressive timelines and will be responsible for monitoring, analyzing, and responding to events and alerts supporting statewide IT systems. 

Required Experience:

Hands-on experience working with Endpoint Detection and Response (EDR) tools
Experience responding to, and analyzing, cyber-security events and incidents
Experience working with Crowdstrike, or comparable EDR tool
Ability to work in high-pressure, fast-paced environments

Experience working with CrowdStrike or comparable EDR tool

Responsibilities:
Provide security monitoring and response efforts for, and in coordination with, the Security Operations Center (SOC)
Lead outreach and coordination with statewide partners, including County, Municipal, and educational entities

Strong communication, reporting, and documentation abilities

Monitor, analyze, and respond to cyber-security events, alerts, and incidents affecting client IT systems
Take appropriate actions to protect IT assets from potential incidents and threats
Document and report changes, trends, and implications related to evolving cyber-security tools, systems, and solutions
Follow SOC processes and assist ISD Security Engineers and OCIO support teams during alerts, events, and incidents
Submit new events and update existing events within the SOC ticketing system
Provide phone and email support to state agencies and participating partners during alerts, events, and incidents
Provide off-hours or ad-hoc shift support as required

Proven ability to collaborate effectively with partners across varying technical backgrounds
Capability to perform Tier 1 troubleshooting, including log collection, documentation review, and appropriate escalation
Maintain up-to-date knowledge on relevant cyber-security technologies and tools
Support Tier 1 SOC Analysts in triaging cyber-security events, alerts, and incidents
Follow detailed operational procedures to analyze, escalate, and support remediation of critical security incidents
Assist with SOC metrics, reporting, and communications
Support incident response activities up to the preliminary forensics stage
Monitor EDR tools and perform initial assessment and data gathering for alerts



Skill - Required / Desired - Amount of Experience
Hands on experience working with Endpoint Detection and Response (EDR) tools - Required - 3 Years
Experience responding to cyber security events and incidents - Required - 3 Years
Experience working with Crowdstrike, or comparable EDR tool - Required - 3 Years
Ability to work in high pressure, fast paced environments - Required - 3 Years


Notes:

This is a remote position.


VIVA is an equal opportunity employer. All qualified applicants have an equal opportunity for placement, and all employees have an equal opportunity to develop on the job. This means that VIVA will not discriminate against any employee or qualified applicant on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status

Apply for this Job





(Please ensure email matches your resume email)



(document types allowed: doc/docx/rtf/pdf/txt) (max 20MB)

By submitting this form, you are consenting to the VIVA team contacting you via Phone/Email

Related Jobs

Join VIVA and grow

VIVA is faster, easier and you still have complete control