Job Overview
We are actively seeking a dedicated and knowledgeable Security Operations Center (SOC) Analyst (Level 2) to become an integral part of our team. In this pivotal role, you will collaborate with our global clientele to oversee IT security and mitigate the repercussions of security incidents. Your contributions will be vital in ensuring that essential business operations continue without disruption in a dynamic environment. This position is an exceptional opportunity for those aspiring to advance their careers in cybersecurity while enhancing the safety of diverse organizations.
Key Responsibilities
- Monitor and assess security events and alerts from an array of sources, including SIEM software, intrusion detection systems (IDS), firewall logs, and system logs (Windows and Unix).
- Distinguish genuine security threats from false positives via network and log analysis, escalating potential intrusions and attacks as appropriate.
- Generate and manage tickets, documenting and escalating security incidents to senior analysts when required.
- Act as a technical escalation point and mentor for junior analysts.
- Maintain regular communication with customer IT teams regarding security issues, assisting in remediation and ensuring uninterrupted business operations.
- Evaluate incoming concerns to prioritize based on risk and urgency.
- Partner with customers to implement monitoring systems and uphold comprehensive security measures.
- Stay informed on the latest trends and advancements within the cybersecurity threat landscape.
Required Skills
- Strong teamwork and collaboration aptitude.
- Proficiency in intrusion detection/prevention systems and SIEM software.
- In-depth understanding of network protocols and devices.
- Familiarity with Mac OS, Windows, and Unix systems.
- Capability to analyze event logs for signs of cyber intrusions or attacks.
- Composure and productivity in high-pressure scenarios.
- Experience working directly with clients to comprehend their security needs and deliver effective solutions.
- Excellent written and verbal communication skills, simplifying complex technical topics for diverse audiences.
- Ability to work efficiently with a globally distributed team.
- Flexibility to operate within a 24/7/365 environment, including nights and weekends, adhering to a rotating shift schedule.
- Capability to provide tuning recommendations for security tools.
- Knowledge of network analysis resources such as Wireshark, TCP Dump, Security Onion, and Splunk.
- Proficiency in SIEM, packet analysis, malware detection, HIDS/NIDS, network monitoring tools, case management systems, and web/email security.
Qualifications
- 2-4 years of relevant hands-on experience in SOC, TOC, or NOC operations.
- Security certifications such as GCIA, GCIH, GCFE, CISSP, Security+, Network+, CEH, RHCA, RHCE, MCSA, MCP, or MCSE are highly desirable.
- Familiarity with analytical tools like IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus.
- Understanding of IT Infrastructure tools such as GPO and Landesk.
- A minimum of a bachelor’s degree in Information Security, Computer Science, or a related IT field. Candidates with extensive experience in security or network operations may also be considered.
Career Growth Opportunities
This position offers a unique chance to mentor less experienced analysts while expanding your own expertise in cybersecurity. You will gain exposure to a variety of security operations, which will significantly contribute to your professional development in this fast-evolving field.
Company Culture and Values
We pride ourselves on fostering an inclusive environment that emphasizes teamwork, collaboration, and continuous learning. Our dedicated team works closely to overcome challenges, ensuring a supportive atmosphere where everyone can thrive and advance their careers in cybersecurity.
Employment Type: Full-Time