Security Operations Centre Analyst for Long View's IGS branch, focused on incident detection and response. Collaborating with teams to monitor, identify, and remediate security incidents.
Responsibilities
Actively participate in 24x7 operations of the Long View Security Operations Centre for L2 support
Monitor, identify and validate security events generated from Security Information Event Management (SIEM) tools
Actively work in monitoring, event and incident management tools like Sentinel and BMC Remedy
Respond to critical business impacting situations and coordinate the efforts required to engage the proper resources to remediate the issue
Coordinate major security incident situations and provide internal communications via email in a timely manor
Provide general support for Security Information Event Management (SIEM) tool changes, tweaks, additions and updates within Sentinel and any additional tools leveraged by Long View
Provide security guidance to team members across the organization how to best identify, contain and remediate security related incidents
Understand complex issues across on-premise, public and private cloud solutions and articulate the impact to higher tier team members
Follow and establish process documentation for receipt of security alerts for monitored devices, acknowledge the receipt of the event, opening and/or updating service desk tickets to track the handling of events to resolution and closure, assignment of the ticket to the appropriate owner
Work with cloud technologies like Azure, AWS and Google Cloud Platform
Fulfill reporting requests that can be pulled from Long View tools
Requirements
5+ years of professional experience in incident detection and response, malware analysis, or cyber forensics
Extensive experience evaluating, interpreting, and integrating relevant data sources for the purpose of merging network attack analyses with counterintelligence and law enforcement investigations
Experience with various IT service management tools including performance monitoring and ITSM solutions
Experience with Security Information Event Management platforms like Sentinel, Splunk and Sumo Logic as well as XDR
Experience working with incident, problem, change and service requests that follow ITIL framework standards
Experience provisioning new client services and working through customer onboarding tasks
Proven ability to troubleshoot and resolve technical and procedural issues
Strong verbal and written communication which will allow you to communicate effectively to customers in non-technical terms
Ability to react quickly and professionally with a sense of urgency
Ability and desire to work on an on-call rotation for 24-hour support
Benefits
Interesting work – Be part of exciting projects while accessing all the latest technologies
Career growth – Permanent staff positions, paid training, career life planning, and relocation and travel opportunities
Security Analyst managing network security tools to protect systems at Riachuelo. Collaborating with teams to ensure operational resilience and security compliance.
Intermediate Security Operations Centre Analyst involved in IT security operations for a dynamic IT provider. Collaborating with internal teams for incident detection and response across various platforms.
SOC Engineer at Replit monitoring and assessing emerging threats in cloud infrastructure and AI coding environments. Conducting investigations and collaborating with teams for mitigation strategies.
Security Operations Lead overseeing global SOC operations and AI product integration at Replit. Leading monitoring and incident response across multi - cloud environments and AI workloads.
Cybersecurity Incident Response Engineer in Comcast's Security Incident Response Team mitigating threats and restoring environments following incidents. Working with advanced technologies to safeguard customers and infrastructure.
Director of Security Operations responsible for strategic leadership and operational excellence in security at Abridge. Leading teams focused on preventing, detecting, and responding to security threats.
Sr. Security Incident Response Engineer leveraging Splunk expertise to investigate security incidents at Autodesk. Monitoring and analyzing threats while collaborating with incident response teams.
Lead incident response efforts for a global fintech focusing on Microsoft E5 security capabilities and DLP. Drive detection, containment, and proactive security measures for the enterprise.
SOC Analyst I monitoring and responding to cybersecurity threats for Byline Bank. Assisting in protecting customer and business information with compliance and real - time threat management.