Job Overview
We are eager to welcome candidates for the position of SOC Security Analyst (Level 2). While we favor applicants who can work in a hybrid format from College Park, Maryland, we are also open to remote candidates based within the United States. The position operates on a distinctive Panama schedule, with four teams executing two 12-hour shifts to ensure round-the-clock coverage. The schedule consists of 2 days on, 2 days off, 3 days on, 2 days off, 2 days on, and 3 days off.
Key Responsibilities
- Monitoring & Analysis: Oversee and evaluate security events and alerts from diverse sources, including SIEM software, intrusion detection systems, firewall logs, and system logs (Windows and Unix).
- Threat Identification: Distinguish authentic threats from false positives through comprehensive network and log analysis, escalating any suspected intrusions or attacks as required.
- Ticket Management: Initiate, document, and manage tickets, escalating them to higher-level security analysts when necessary.
- Mentorship: Serve as a technical escalation point, providing mentorship to junior analysts and promoting their professional development.
- Communication: Regularly collaborate with customer IT teams to update them on issues, assist in remediation efforts, and ensure seamless business operations.
- Triage: Analyze incoming issues to prioritize and establish risk levels.
- Customer Collaboration: Partner with clients to implement monitoring systems and stay informed about the evolving threat landscape.
Required Skills
- Strong collaboration and teamwork capabilities.
- Proficiency with intrusion detection/prevention systems and SIEM software.
- Knowledge of network protocols and devices.
- Competence in Mac OS, Windows, and Unix systems.
- Ability to analyze event logs and recognize signs of cyber intrusions.
- Expertise in managing high-pressure situations with professionalism and efficiency.
- Exceptional written and verbal communication abilities, with a knack for articulating complex technical concepts clearly.
- Comfort in a 24⁄7 work environment, including nights and weekends, as part of a rotating shift schedule.
- Familiarity with security tools such as Wireshark, TCP Dump, Security Onion, and Splunk.
Qualifications
- 2-4 years of practical experience in SOC, TOC, or NOC environments.
- Relevant certifications, including GCIA (required), along with GCIH, GCFE, CISSP, Security+, Network+, CEH, RHCA, RHCE, MCSA, MCP, or MCSE (preferred).
- Experience with tools like IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus.
- Understanding of programming or scripting languages and the ability to execute basic database queries.
Career Growth Opportunities
In this role, you will have the opportunity to act as a mentor for junior analysts, supporting their professional development while enhancing your own leadership skills within a collaborative environment.
Company Culture And Values
We are committed to effective cybersecurity for our clients and their supply chains. Our dedicated team consists of experts who harness advanced data, analytics, and technology to secure their ecosystems. Join us in making a substantial impact on cybersecurity and safeguarding what truly matters.
Employment Type: Full-Time