SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.
Responsibilities
A Security Operations Center (SOC) Analyst II provides real time security monitoring and threat hunting in our Security Operations Center.
Work with customers across many industries by providing managed security services such as XDR, SIEM, vulnerability scanning, firewall and end point management.
Provide exceptional customer service by assisting customers in identifying potential security incidents, attack sources, root causes and/or threat actors.
Provides security event monitoring and analysis to identify critical security events at client sites.
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
Coordinate with customer staff to validate security alerts.
Document and escalate incidents that may cause ongoing and immediate impact to the environment.
Perform event correlation using information gathered from a variety of sources to gain situational awareness and determine the effectiveness of an observed attack.
Receive and analyze network alerts from various sources and determine possible causes of such alerts.
Provides recommendations for system tuning and enhancements.
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
Conduct research, analysis, and correlation across a wide variety of all source data sets.
Notify customer of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action.
Work with customers to resolve computer security incidents and vulnerability compliance.
Provide guidance and expertise to SOC Analyst I’s and other team members.
Participate in an on-call rotation.
Commits changes to DevOps repositories and syncs global changes to client environments.
Serve as the primary person for onboarding new clients into the various services.
Writes new analytics rules, log parsers, and workbooks.
Performs proactive threat hunting.
Serves as a technical resource for the Sales team during the sales process by answering questions and/or performing demos of SOC services.
Requirements
Associate of Applied Science (AAS) or bachelor’s degree or equivalent experience
1+ years working within a security operations center
Experience with security tools
Experience with SIEM software
Experience with Defender for endpoint
Azure, AWS, GCP
DevOps
Benefits
Equal Opportunity Employer - Including Disabled and Veterans
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.