Job Description
Candidates must have a strong sense of urgency and an aptitude for investigation. You'll have the chance to collaborate with internal departments, third parties, and management to ensure security issues are investigated and enforcement standards are met - so excellent communication skills are a must.
The SOC Analyst must be competent to work at a high technical level and be capable of identifying threats, and threat vectors that cause security events.
Shift: 12:00 pm-12:00 am, 4 days on, 4 days off.
- Ensure a high level of quality when managing tickets and customer requests.
- Work closely with security teams across the org to develop support plans.
- Triage and escalate security incidents and requests.
- Engage with customers to build and maintain good relationships.
- Create and maintain procedural documentation and instructions.
- Participate regularly in SOC working group sessions, including idea generation for new content rules for security alerting and technology implementations/advancement.
- Collaborate across organizational lines and develop depth in your desired cyber discipline and/or technologies.
- Monitors and analyzes Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) to identify security issues for remediation.
- Evaluates/deconstruct malware (e.g., obfuscated code) through open-source and vendor-provided tools.
- Creates, modifies, and updates Security Information Event Management (SIEM) rules.
- Follow documented procedures yet have an eye towards process improvement/effectivity.
Job location: Remote Position