Network security analyst job description
Updated March 14, 2024
8 min read
Find better candidates in less time
Post a job on Zippia and take the best from over 7 million monthly job seekers.
Example network security analyst requirements on a job description
Network security analyst requirements can be divided into technical requirements and required soft skills. The lists below show the most common requirements included in network security analyst job postings.
Sample network security analyst requirements
- Expert knowledge of network security principles
- Proficient in security protocols and encryption algorithms
- Familiarity with firewall, IDS/IPS, DLP, SIEM technologies
- Ability to configure and troubleshoot network devices
- In-depth understanding of network infrastructure and architecture
Sample required network security analyst soft skills
- Excellent analytical and problem-solving skills
- Excellent communication and collaboration skills
- Ability to work independently and in teams
- Ability to prioritize tasks and meet deadlines
- Ability to stay up-to-date with industry trends and developments
Network security analyst job description example 1
Jane Street network security analyst job description
About the Position
We are looking for a Network Security Analyst who will help us maintain the team's highest level of service and keep our network security levels ahead of our business demands, while pushing for more standardization through automation.
Jane Street's numerous distributed systems are built on an agile, reliable, multi-vendor network infrastructure that supports all traffic profiles from trading to internet connectivity. Enabling those systems to operate in a secure and auditable manner is a key mission of the Network Security team.
Strong communication and interpersonal skills will be needed to collaborate with colleagues across the firm globally. You will find and resolve issues, plan and execute deployments, and improve systems where possible. Additional responsibilities of this role will include:
Getting the details right and keeping good records will be critical in this role. Striving to improve the team through documentation and contributing to our monitoring and automation systems will be a must.
About You
We are looking for a Network Security Analyst who will help us maintain the team's highest level of service and keep our network security levels ahead of our business demands, while pushing for more standardization through automation.
Jane Street's numerous distributed systems are built on an agile, reliable, multi-vendor network infrastructure that supports all traffic profiles from trading to internet connectivity. Enabling those systems to operate in a secure and auditable manner is a key mission of the Network Security team.
Strong communication and interpersonal skills will be needed to collaborate with colleagues across the firm globally. You will find and resolve issues, plan and execute deployments, and improve systems where possible. Additional responsibilities of this role will include:
- Working on a cross-team project to deploy firewalls in a DMZ environment
- Interacting with stakeholders to establish and push firewall policies
- Setting up a logging pipeline for new security appliances
- Contributing to support tasks and actively taking steps to improve the team's ability to monitor our systems effectively, through scripting and/or conveying requirements to our dedicated developers
Getting the details right and keeping good records will be critical in this role. Striving to improve the team through documentation and contributing to our monitoring and automation systems will be a must.
About You
- Hands-on experience with firewall configuration and troubleshooting
- Strong understanding of network security principles and technologies
- Experienced operating a DMZ network
- Experienced working with routing protocols (BGP, OSPF)
- Motivated to automate workflows to increase efficiency
- High capacity to learn; we are more interested in how you think than what you already know
- Strong ability to context switch and organize your workload
- Clear communication skills and a high degree of customer service
- A flexible and reliable team player who enjoys working in a collaborative environment
- Proficiency in a programming language is preferred
- Fluency in English is required
Post a job for free, promote it for a fee
Network security analyst job description example 2
The Select Group network security analyst job description
Position Title:
Network Security Analyst III
Work Location:
Hybrid Work Schedule - 3 days/week onsite at the data center
Must-Have Skills:
-
Hands on experience with
Firewalls
(
Palo Alto
preferred)
- Experience with the physical firewalls
- Prisma Access experience
- Ticketing experience ( ServiceNow preferred)
- Hands on experience with network, OS, and application security (networking protocols, ability and understanding of how to move through the network)
- Must have excellent technical skills in security software, appliances, operation system software and networking
Daily Responsibilities:
- Will assure that an acceptable level of network security is maintained throughtout the CNP network environments by providing network security consulting, perform security reviews on a wide range of evolving network technologies and processes, and other related network security services
- Provide ticketing support and escalation where needed
- Maintain/optimize the CNP firewall infrastructure, both on prem and in the cloud
- Maintains/optimize Network Segmentation environment and zones
- Maintains/optimize Client Remote access solutions (VPN troubleshooting, access, etc.)
- Maintains/optimizes PGP encryption, URL content filter, Firewall DLP environments
- Advises departments on policies, regulatory compliance, and security best practices, providing training as required
- Serves as the subject matter expert for security best practices, policies, and regulatory requirements
- Provides support and assistance during internal and external audits
- Interfaces with technical vendors regarding security issues and recommend solutions
- Develops network security standards
- Develops network security architecture designs
- Ensures network security rules, standards, and architecture is adequate to safeguard the CNP network
Dealing with hard-to-fill positions? Let us help.
Network security analyst job description example 3
Peraton network security analyst job description
As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets.
The Cyber Network Security Analyst position will be located in Pensacola, FL. (Arlington, VA may be a possibility as well)
Perform technical analysis on a wide range of cybersecurity issues, with a focus on network activity and data; this includes, but is not limited to: network flow (i.e. netflow) or related forms of session summary data, signature-based IDS alert/event data, full packet capture (PCAP) data, proxy and application server logs (various types).
Triage IDS alerts, collect related data from various network analysis systems, review available open and closed source information on related threats & vulnerabilities, diagnose observed activity for likelihood of system infection, compromise or unintended/high-risk exposure.
Prepare analysis reports detailing background, observables, analysis process & criteria, and conclusions.
Analyze large volumes of network flow data for specific patterns/characteristics or general anomalies, to trend network activity and to correlate flow data with other types of data or reporting regarding enterprise-wide network activity.
Leverage lightweight programming/scripting skills to automate data-parsing and simple analytics. Document key event details and analytic findings in analysis reports and incident management systems. Identify, extract and characterize network indicators from cyber threat intelligence sources, incident reporting and published technical advisories/bulletins.
Assess cyber indicators/observables for technical relevance, accuracy, and potential value/risk/reliability in monitoring systems. Recommend detection and prevention/mitigation signatures and actions as part of a layered defensive strategy leveraging multiple capabilities and data types.
Develop IDS signatures, test and tune signature syntax, deploy signatures to operational sensors, and monitor and tune signature and sensor performance.
Fuse open-source threat & vulnerability information with data collected from sensors across the enterprise into cohesive and comprehensive analysis.
Provide technical assessments of cyber threats and vulnerabilities. Communicate and collaborate with analysts from other SOC organizations to investigate cyber events. Produce final reports and review incident reports from junior analysts. Monitor and report on trends and activity on network sensor platforms. Produce and update technical analysis documentation (processes, procedures, analysis criteria, report templates, etc.).
Basic Qualifications:
Bachelor’s Degree and a minimum of 5 years related technical experience required. 4 additional years of experience may be substituted in lieu of degree. Working knowledge of security concepts, protocols, processes, architectures and tools (vulnerabilities, threats and exploitation, authentication & access control technologies, threat intelligence data and sources, WHOIS and DNS referential data and sources, intrusion detection/prevention capabilities, network traffic analysis, SIM technology, incident handling, media/malware analysis, etc.). Working knowledge of networking concepts, protocols and architectures (OSI-model, TCP/IP, major application protocols such as DNS/HTTP/SMTP, LAN/WANs, VPNs, routers/routing, addressing, etc.). Detailed knowledge of intrusion detection engines, capabilities and signature formats in general, with a specific focus on Snort/Sourcefire variations and regular expressions (REGEX). Knowledge of cyber policy & issues, the global cyber community, roles of major organizations how they interrelate and interact, and challenges in these structures. Awareness of the common cyber products and services, an understanding of their limitations, and a comprehensive understanding of the disciplines of cybersecurity. Ability to produce results in a fast-paced environment with the ability to meet iterative deadlines. Active Top Secret Security clearance with SCI eligibility is required. In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment.
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.
An Equal Opportunity Employer including Disability/Veteran.
Colorado Salary Minimum: $68,500
Colorado Salary Maximum: $166,300
The estimate displayed represents the typical salary range for this position, and is just one component of Peraton's total compensation package for employees. Other rewards may include annual bonuses, short- and long-term incentives, and program-specific awards. In addition, Peraton provides a variety of benefits to employees.
The Cyber Network Security Analyst position will be located in Pensacola, FL. (Arlington, VA may be a possibility as well)
Perform technical analysis on a wide range of cybersecurity issues, with a focus on network activity and data; this includes, but is not limited to: network flow (i.e. netflow) or related forms of session summary data, signature-based IDS alert/event data, full packet capture (PCAP) data, proxy and application server logs (various types).
Triage IDS alerts, collect related data from various network analysis systems, review available open and closed source information on related threats & vulnerabilities, diagnose observed activity for likelihood of system infection, compromise or unintended/high-risk exposure.
Prepare analysis reports detailing background, observables, analysis process & criteria, and conclusions.
Analyze large volumes of network flow data for specific patterns/characteristics or general anomalies, to trend network activity and to correlate flow data with other types of data or reporting regarding enterprise-wide network activity.
Leverage lightweight programming/scripting skills to automate data-parsing and simple analytics. Document key event details and analytic findings in analysis reports and incident management systems. Identify, extract and characterize network indicators from cyber threat intelligence sources, incident reporting and published technical advisories/bulletins.
Assess cyber indicators/observables for technical relevance, accuracy, and potential value/risk/reliability in monitoring systems. Recommend detection and prevention/mitigation signatures and actions as part of a layered defensive strategy leveraging multiple capabilities and data types.
Develop IDS signatures, test and tune signature syntax, deploy signatures to operational sensors, and monitor and tune signature and sensor performance.
Fuse open-source threat & vulnerability information with data collected from sensors across the enterprise into cohesive and comprehensive analysis.
Provide technical assessments of cyber threats and vulnerabilities. Communicate and collaborate with analysts from other SOC organizations to investigate cyber events. Produce final reports and review incident reports from junior analysts. Monitor and report on trends and activity on network sensor platforms. Produce and update technical analysis documentation (processes, procedures, analysis criteria, report templates, etc.).
Basic Qualifications:
Bachelor’s Degree and a minimum of 5 years related technical experience required. 4 additional years of experience may be substituted in lieu of degree. Working knowledge of security concepts, protocols, processes, architectures and tools (vulnerabilities, threats and exploitation, authentication & access control technologies, threat intelligence data and sources, WHOIS and DNS referential data and sources, intrusion detection/prevention capabilities, network traffic analysis, SIM technology, incident handling, media/malware analysis, etc.). Working knowledge of networking concepts, protocols and architectures (OSI-model, TCP/IP, major application protocols such as DNS/HTTP/SMTP, LAN/WANs, VPNs, routers/routing, addressing, etc.). Detailed knowledge of intrusion detection engines, capabilities and signature formats in general, with a specific focus on Snort/Sourcefire variations and regular expressions (REGEX). Knowledge of cyber policy & issues, the global cyber community, roles of major organizations how they interrelate and interact, and challenges in these structures. Awareness of the common cyber products and services, an understanding of their limitations, and a comprehensive understanding of the disciplines of cybersecurity. Ability to produce results in a fast-paced environment with the ability to meet iterative deadlines. Active Top Secret Security clearance with SCI eligibility is required. In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment.
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.
An Equal Opportunity Employer including Disability/Veteran.
Colorado Salary Minimum: $68,500
Colorado Salary Maximum: $166,300
The estimate displayed represents the typical salary range for this position, and is just one component of Peraton's total compensation package for employees. Other rewards may include annual bonuses, short- and long-term incentives, and program-specific awards. In addition, Peraton provides a variety of benefits to employees.
Start connecting with qualified job seekers
Resources for employers posting network security analyst jobs
Network security analyst job description FAQs
Ready to start hiring?
Updated March 14, 2024