Monitor and respond to clients through all supported email, messaging, and phone platforms
Proactively monitor security dashboards to detect and respond to emerging threats in real-time
Identify alerts that require additional analysis and facilitate their escalation– internally or externally –for further investigation and resolution
Understand, identify, and research Indicators of Compromise (IOCs) to support threat detection and incident response efforts
Review and analyze security logs and event data from various sources, such as firewalls, intrusion detection systems, and endpoint security tools to identify potential security incidents
Complete all assigned internal and external reports by their deadlines, or in a timely manner if one is not provided
Receive and perform initial triage of security alerts, assess their severity, and determine appropriate actions for resolution
Contribute to tuning of managed security tools by identifying trends and optimizing alert fidelity
Stay informed about the latest cybersecurity threats, vulnerabilities, and attack techniques, and apply this knowledge to enhance the SOC's threat detection capabilities
Monitor and maintain unassigned and assigned ticket queues, ensuring timely resolution and effective communication with stakeholders
Maintain average ticket processing time checkpoints in accordance with SLA’s
time to acknowledge, time to triage, and time to notify
Completing all assigned training in agreed upon time frames
Requirements
College Degree or equivalent required
1 year related experience
Proficient use of applicable technology
Ability to follow technical instructions and guidelines
Ability to document daily activities and system functions
Able to work in a team environment
Demonstrated ability to communicate verbally and in writing throughout all levels of an organization, both internally and externally
Ability to travel as required by business and on-call availability