Senior Security Operations Center Analyst protecting computer systems and data through investigation and incident response. Collaborating with IT leaders and mentoring junior analysts in security operations.
Responsibilities
Planning and implementing security measures to protect computer systems, networks, and data.
Handling higher level security investigations and incidents.
Monitoring network traffic for security events and performing triage analysis to identify security incidents.
Receiving incidents and performing deep analysis; correlating with threat intelligence to identify the threat actor, nature of the attack and systems or data affected.
Defining and executing on strategy for containment, remediation, and recovery.
Delivering cyber intelligence services and material to information technology and business leaders.
Participating in threat hunting activities to proactively search for threats in the enterprise environment.
Acting as coordinator in the event of escalated cyber threats/incidents for Tier 1 analysts.
Mentoring for junior level analysts.
Requirements
Bachelor's degree required in Information Assurance, Computer Science, Engineering, or related technical field.
Three (3) years or more experience in information security administration, offensive tactics, monitoring, and IR.
Three (3) years or more experience related security systems administration with endpoint, network, application, and host-based security solutions.
Two (2) years or more Cloud computing (e.g., Amazon Web Services, Google Cloud Platform or Microsoft Azure) security configuration and management experience preferred.
Knowledge of the incident handling procedures and intrusion analysis models.
Demonstrated advanced knowledge of cyber security operations with a focus area in two or more of the following: Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider) vulnerabilities, and exploits; incident response, investigations and remediation.
Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration.
Benefits
medical, prescription, dental, vision, life insurance and disability insurance options
paid time off for vacation, illness, bereavement, family and parental leave
tax-advantaged 401(k) retirement savings plan
Job title
Senior Information Security Operations Center Analyst
Security Engineer enhancing cybersecurity tools and solutions for The Walt Disney Company. Performing system analyses and developing security configurations for improved protection against cyber threats.
Security Operations Lead responsible for security operations aligning with policies and compliance. Handling incident response, vulnerability management, and supporting IT teams with security expertise.
Cyber Security Specialist protecting digital estate from threats at the University of Edinburgh. Focused on identifying and mitigating cyber risks while supporting teaching and research services.
Lead Specialist in Security Operations, enhancing detection engineering and incident response at Pearson. Collaborate with teams and drive process improvements in a high - paced environment.
Cybersecurity Incident Response Analyst detecting and responding to cyber threats at NOV. Collaborating using AI tools to enhance cybersecurity operations across IT, cloud, and OT environments.
Security Engineer II at AvidXchange enhancing security operations and incident response. Collaborating with teams to develop, tune and improve security monitoring and automation capabilities.
Director leading security operations strategy and overseeing investigations at Ford Motor Company. Responsible for global investigations, crisis management, and team leadership.
Lead global Cyber Detect and Respond team at Assa Abloy, ensuring timely incident response and security compliance. Oversee operations while collaborating across IT and business functions for effective threat management.