Job Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
- Monitor level 1 analyst performance by investigating incoming events using SOC-available tools.
- Ensure level 1 event(s) are addressed in a timely manner using available reporting and metrics.
- Approve and, if necessary, further investigate level 1-escalated events.
- Mentor level 1 analysts to improve detection capability within the SOC.
- Manage SOC event and information intake to include gathering intelligence reports, monitoring ticket queues, investigating reported incidents, and interacting with other security and network groups as necessary.
- Serve as detection authority for initial incident declaration.
- Function as shift subject-matter experts (SMEs) on incident detection and analysis techniques, providing guidance to junior analysts and making recommendations to organizational managers.
- Drive and monitor shift-related metrics processes ensuring applicable reporting is gathered and disseminated per SOC requirements.
- Conduct security research and intelligence gathering on emerging threats and exploits.
- Serve as a backup analyst for any potential coverage gaps to ensure business continuity
- Create Use Cases make sure all threat being tracked
Job Requirements
- 2-3 years of experience.
- Proficient in Incident Management and Response.
- Experience in security device management and SIEM.
- Knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
- Experience in threat management.
- Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix.
- Knowledge of applications, databases, middle ware to address security threats against the same.
- Proficient in preparation of reports, dashboards and documentation.
- Excellent communication, analytical, problem solving and interpersonal skills.