Triage, investigate and respond to events produced by our SIEM solution by utilizing a wide array of tools to mitigate active threats
Enforce information security policy, standards and guidelines for business operations and technology requirements
Identify IT security risks from technical and functional perspectives
Notify management of suspected incidents and articulate the event’s history, status and potential impact
Assist with Incident Responders when an escalation is required by providing a detailed recount of events
Configure and work with SIEM and SOAR tools, MDR/XDR
Work effectively in a fast-paced team environment by communicating in a detailed, concise manner
Maintain working knowledge of threat detection as the industry evolves
Act as a mentor for Analyst I’s and II’s
Responsible for supporting Security Operations during normal business hours and in an on-call rotation outside normal business hours
Requirements
5 years’ experience as a SOC analyst is required
Experience working with SIEM systems, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools
Experience and/or training in Splunk Enterprise Security and SOAR