Cybersecurity Operations Analyst reviewing security events and responding to potential threats. Collaborating with Cybersecurity and IT Operations teams for incident management.
Responsibilities
Review security events to identify and prioritize potential threats and identify trends utilizing various tools and technologies
Analyze available data sources, security tools, and threat trends to identify attacks against the enterprise
Perform incident response, issue resolution, assessment, and communication of security risks to the enterprise
Recommend and implement defensive measures derived from information collected from a variety of sources
Participate in the day-to-day security operations monitoring and response from the Cybersecurity Operations Center
Perform malware analysis, reverse engineering, and de-obfuscation techniques
Evaluate, respond, and mitigate alerts that originate from the SIEM and the Cybersecurity product suite, e.g. NGFWs, IDS/IPS, Anti-virus, Web Application Firewalls, NAC Solution, etc.
Implement or recommend mitigations including the creation and development of new alerts and rules within the various cyber security tools
Analyze and identify malicious activity during the various attack stages
Maintain a high level of technical expertise on Cyber Security defense-in-depth technology and best practices by performing ongoing research and engagement to maintain awareness of industry trends, best practices
Collaborate with the Cyber Security Engineering and IT Operations teams
Requirements
Bachelor’s degree
3 years of experience in Cybersecurity
Familiar with common attack vectors, DDoS attacks, Phishing, web & application attacks, and malware
Knowledge of common critical network protocols and layer 7 technologies such as SMTP, HTTP, HTTP/S, SSL/TLS, DNS, FTP, SSH, and others
Familiar with a SIEM platform and various cyber security technologies such as EDR, AV, IDS/IPS, and WAFs
Familiarity with advanced persistent threats and their tactics, techniques, and procedures
Familiarity with the incident response Kill Chain
Fundamental understanding of Windows, Mac OSX, and Linux operating systems
Fundamental understanding of OSI model, basic networking and troubleshooting concepts
Experience with programming or scripting, including PowerShell, Bash, Python, Yara, and Perl
Intermediate knowledge of incident response frameworks and handling procedures
Understanding and knowledge of various log formats from a variety of network and computer devices
Knowledge of Cyber risks and threats related to Cyber attackers
Knowledge of recent Cyber events and interpreting kill chain process and threat impacts
Presentation, analytical, and critical-thinking skills
Security Operations Center Analyst managing incidents and security alerts for 7 - Eleven stores. Focusing on in - depth analysis and proactive monitoring within a state - of - the - art Security Operations Center.
Security Operations Manager at Qnity managing physical security programs across global sites. Overseeing operations and collaborating with cross - functional teams to mitigate risk and maintain secure facilities.
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.