SOC Analyst, serve as first line of defense in protecting information systems from internal and external threats
Conduct analysis of security events to include validation, escalation and reporting of events of interest
Responsible for all events of interest and ensure they are continuously monitored and reviewed
Monitoring and analysis of cyber security events
Recognize potential, successful, and unsuccessful intrusion attempts
Working with the Incident Response team to help create RCAs for events escalated to incident levels
Development and execution of Standard Operating Procedures, Event Handlers and Job Aids required for successful task completion
Actively participate in incident resolution, even after they have escalated
Keep the ticket queue assigned.
Requirements
Bachelor’s degree or equivalent in computer science, computer engineering (preferred) or verified security training path
2 years’ experience within a security team, at least 1 year SOC experience is a MUST.
Security Operations Center (SOC) environment experience related SOC and incident monitoring experience a MUST
Experience with SIEM, IDS/IPS, Firewall, Web Application Firewalls, Data Loss Prevention (DLP) and Security Event Correlation.
Excellent analytical and problem-solving skills.
Experience with technical writing.
Experience with one of the following security tools is a plus: CrowdStrike, ExtraHop, Proofpoint, O365 Security, AWS security hub, Azure defender/ security center, Splunk, ELK
English speaking, writing, and reading proficiency (85% at least).