America Networks is a leading sensor and networking solutions partner for companies in any Industrial, Manufacturing, and Waste management space.
We design and manufacture sensors for storage tanks, water metering, energy metering, gas monitoring, and asset management.
Our founders are hardcore telecommunications engineers with combined 200 + years of experience in designing, optimizing and performance engineering; for several mid – large wireless carriers internationally - that saw a need to provide low power, cost efficient sensors to collect data, create alerts, and predict needed actions. We have combined these sensors with low power, wide area (LPWA) networking technologies to provide clients various options to decrease re-occurring costs associated with operating an IoT network of sensors and connected devices.
We specialize in design, deployment, optimization, and support of these Networks. Whether an off-the-shelf or custom solution is needed, we’ll create a solution and push the data on the best cloud platform to fit your needs, including your own.
Security Analysts are expected to handle day-to-day tasks involving SOC (CSIRT) monitoring, incident analysis and investigation, and provide recommendations for remediation as well as short-notice ad hoc work, and see them through to completion with minimal supervision. Security Analysts provide critical value to the SIEM management service, leveraging extensive knowledge to provide context to events. Security Analysts provide recommendations for remediation actions and suggestions for implementing best practices and improving standard processes and procedures. This position requires occasional weekend work. Duties: �Active real-time security monitoring �Security event detection, triage and threat analysis for complex and/or escalated security events �Provide log/network/malware/device analysis and making recommendations for remediation of security vulnerability conditions �Develop internal and/or external documentation, such as detailed procedures, playbooks, and operational metrics reports �Coordinate with SIEM Architects and/or Shift Lead for high priority incidents Required Experience, Education, and Skills: �Must have experience in a security monitoring/incident handling position �Clear and concise written and oral English, including the ability to create technical and procedural documentation �Strong communication skills and ability to engage with customers to understand their requirements �Capability to effectively multi-task, prioritize work, and handle competing interests �Proactive in following up on customer issues �TCP/IP networking skills to perform packet and log analysis �Experience with multiple attack vectors such as Malware, Trojans, Exploit Kits, Ransomware and Phishing techniques �Unix/Linux command line experience Preferred Skills: �Linux, Perl, Python scripting �SANS or other Security industry certifications such as GIAC, GSEC, GCIA, GCIH, GREM, GPEN or OSCP �College Degree preferred �Hands-on experience with SIEM platforms, such as RSA Security Analytics, Splunk, or ArcSight; also Firewalls, Intrusion Detection/Prevention Systems (Snort, Bro, Mcafee IPS, Sourcefire), Proxies, WAF (Imperva, f5 ASM), FireEye and/or Pen Testing �May also perform QA functions to ensure quality ticketing practices across the team