SOC Analyst responsible for monitoring threats and vulnerabilities in IT systems. Engaging with clients and providing incident remediation documentation and recommendations.
Responsibilities
Monitor global IDS, Network Intruder, Firewall, DDoS detection and mitigation, availability and SIEM platforms looking for potential threats, vulnerabilities and indicators of compromise.
Provide Incident remediation and prevention documentation and recommendations to customers based on defined procedures and analyst experience.
Document and conform to processes related to security monitoring procedures.
Provide customer service that exceeds our customers’ expectations at all times.
Initiate escalation procedure to counteract potential threats, vulnerabilities and threat actors.
Compilation and review of service focused reporting.
Act as an escalation point for more junior members of the team, providing assistance and mentoring where necessary.
Providing assistance to Senior SOC Analysts on Threat Hunting engagements.
Contributing to the continuous improvement of SOC procedures and documentation.
Perform other duties as assigned.
Requirements
Practical knowledge of security and networking toolsets such as SIEM, IDS, Vulnerability Management, Availability Monitoring, packet capture and other threat detection technologies.
Pre-existing, in-depth knowledge of common network protocols.
Pre-existing, in-depth knowledge of Windows and Linux based operating systems.
Experience in the extensive analysis of common security incidents.
Ability to stay calm in highly sensitive and high-pressure incidents.
Experience with LogRhythm, ArcSight or Splunk is desirable but not required.
The following certifications are desirable, but not a requirement: CREST CPSA / CRIA / CMRE / CNIA / CHIA, CompTIA Security+, CompTIA Network+, Degree in related field.
SOC Analyst Level 2 role focusing on security incidents and response plans in a hybrid environment. Working with cross - functional teams to enhance security practices and incident handling.
Cybersecurity Analyst monitoring network and system activity at AT&T to detect and respond to cyber threats. Participating in incident response and threat analysis for US Government Program.
Journeyman Cyber Security Analyst monitoring network and responding to cyber threats. Engaging with US Government Program for IT Services related to Cyber Security in Omaha, Nebraska.
Security Operations Consultant delivering security monitoring and incident response services through Microsoft Sentinel. Collaborating with clients and teams to enhance security posture in hybrid and cloud environments.
Security Operations Engineer supporting monitoring, investigation and response to security threats in IT systems. Join the Information Security team for a 9 - month fixed - term contract based in London.
Senior SOC Analyst responsible for monitoring security alerts and enhancing defenses for a global gaming platform. Working with a talented team to revolutionize the gaming industry.
SOC Analyst (Level 2) focusing on security monitoring, incident response, and threat analysis at Profile Software in Greece. Key responsibilities include overseeing SOC operations and mentoring junior analysts.
Cyber Security Operations Manager overseeing global security operations and incident response for LEAP. Improving security measures and compliance frameworks aligned with business growth.
Senior Engineer ensuring the protection of information systems and mitigating cybersecurity threats at Fiserv. Collaborating with teams to enhance security protocols and maintain system integrity.