SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Responsibilities
provide tier II cybersecurity support in a Security Operations Center “SOC” environment
regularly conduct vulnerability assessments
analyze cyber threats
monitor the email gateway
create reports on all confirmed or suspicious activities
work closely with the Tier I and other Tier II personnel
assist with training SOC Analyst I team members
use intrusion detection technologies to apply techniques for identifying host and network-based intrusions
create, update, and resolve incident tickets
review asset discovery and vulnerability assessment data
lead incidents from alert to resolution
determine and direct remediation and recovery efforts
inform and brief status of incidents to CSOC manager, CISO, DCIO, or CIO
may manage and configure security monitoring tools
Requirements
U.S. Citizen
active DOD Top Secret Clearance
at least three (3) years of professional experience in incident detection and response, malware analysis, or cyber forensics
bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field
at least one certification as required by Dept. of Defense (DoD) 8570.01-M and DoD Directive 8140.01, IAT Level II or higher
at least one of the following additional certifications: CompTIA CASP+, GIAC GCIH, Microsoft AZ-500, Microsoft SC-200, Splunk Core Certified Advanced Power User
extensive experience working with various security methodologies, standard operating procedures, processes, and workflows
experience configuring and implementing various technical security solutions
extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices
experience with some or all of the following is required: computer networking concepts, OSI model, and network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services, and network security
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.