SOC Analyst monitoring global IDS, Firewall, and SIEM platforms for threats. Providing incident remediation and recommendations to customers based on established procedures and experience.
Responsibilities
Monitor global IDS, Network Intruder, Firewall, DDoS detection and mitigation, availability and SIEM platforms looking for potential threats, vulnerabilities and indicators of compromise.
Provide Incident remediation and prevention documentation and recommendations to customers based on defined procedures and analyst experience.
Document and conform to processes related to security monitoring procedures.
Provide customer service that exceeds our customers’ expectations at all times.
Initiate escalation procedure to counteract potential threats, vulnerabilities and threat actors.
Compilation and review of service focused reporting.
Act as an escalation point for more junior members of the team, providing assistance and mentoring where necessary.
Providing assistance to Senior SOC Analysts on Threat Hunting engagements.
Contributing to the continuous improvement of SOC procedures and documentation.
Perform other duties as assigned.
Requirements
Practical knowledge of security and networking toolsets such as SIEM, IDS, Vulnerability Management, Availability Monitoring, packet capture and other threat detection technologies.
Pre-existing, in-depth knowledge of common network protocols.
Pre-existing, in-depth knowledge of Windows and Linux based operating systems.
Experience in the extensive analysis of common security incidents.
Ability to stay calm in highly sensitive and high-pressure incidents.
Experience with LogRhythm, ArcSight or Splunk is desirable but not required.
The following certifications are desirable, but not a requirement: CREST CPSA / CRIA / CMRE / CNIA / CHIA, CompTIA Security+, CompTIA Network+, Degree in related field.
Director leading security operations strategy and overseeing investigations at Ford Motor Company. Responsible for global investigations, crisis management, and team leadership.
Lead global Cyber Detect and Respond team at Assa Abloy, ensuring timely incident response and security compliance. Oversee operations while collaborating across IT and business functions for effective threat management.
Lead Cybersecurity Analyst responsible for technical leadership of a 24x7 SOC team at AT&T. Drive operational standards, incident response, and continuous improvement initiatives.
Senior Security Operations Center Analyst protecting computer systems and data through investigation and incident response. Collaborating with IT leaders and mentoring junior analysts in security operations.
Security Operations Engineer creating automations and detection strategies for security infrastructure. Collaborating across teams to enhance security measures and protect organizational assets.
Solution Sales Manager driving revenue growth in Austria and Switzerland's financial sector. Collaborating with teams and managing sales cycles for ServiceNow and Tanium - related services.
Lead SOC Analyst responsible for monitoring and controlling OCLC services. Providing leadership and mentorship while ensuring service delivery and incident management in a hybrid work environment.
Technical Writer supporting Cyber Security Operations Center, documenting processes and workflows for incident response. Collaborating with analysts and engineering teams to create actionable documentation.