Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Resolution Analyst Jobs
Recruited by CDK Global 8 months ago Address United States
Soc Analyst 1 Jobs
Recruited by Information Resource Group 9 months ago Address United States
Soc Analyst Tier 1 - Blue Team
Recruited by A2SECURE 9 months ago Address United States
Senior Soc Analysts Jobs
Recruited by Clovity 10 months ago Address United States
Soc Analyst Tier 2 Jobs
Recruited by Leidos 10 months ago Address United States
Soc Analyst Tier 1 Jobs
Recruited by Leidos 10 months ago Address United States
Security Operations Center (Soc) Analyst
Recruited by InSource, Inc 10 months ago Address United States
Sr Soc Analyst Team Lead
Recruited by Axiom Global Technologies 10 months ago Address United States
Security Operations Center (Soc) Analyst, Tier 1 (Eastern Us)
Recruited by Cybereason 10 months ago Address United States
Cybersecurity Analyst Jobs
Recruited by Denken Solutions, Inc. 10 months ago Address United States
Remote: Soc Analyst Jobs
Recruited by Stellar Professionals 10 months ago Address United States
Security Operations Center Analyst(Soc)
Recruited by Sira Consulting, an Inc 5000 company 11 months ago Address United States
Cyber Security Engineer - Soc/Automation
Recruited by ForgeRock 11 months ago Address United States
Soc Analyst -- Remote
Recruited by Dice 11 months ago Address United States

Soc Analyst Jobs

Company

Innova Solutions

Address United States
Employment type FULL_TIME
Salary
Category IT Services and IT Consulting
Expires 2023-07-16
Posted at 11 months ago
Job Description

Title: Sr SOC Analyst

Location: Remote

Type: Direct Hire

Compensation: to 115 to 135k, Benefits, 10% bonus (individual performance/company performance)



We are seeking a driven, passionate, and enthusiastic team members to join our team of information security professionals. The Sr SOC Analyst will be the Subject Matter Expert (SME) on the investigation process, providing guidance to the Security Analyst team. The ideal candidate will be well versed in security event analysis through industry best practice toolsets, have a deep knowledge of current emerging threats, security content development, and be able to develop risk mitigation strategies required to protect the confidentially, integrity, and availability of information systems and data. Candidates should be proficient at working with internal business units and clients to resolve issues and develop effective action plans.


Responsibilities:

  • Participate in the team’s on-call rotation to serve as an escalation point for after business hours.
  • Routinely evaluates Analyst team pain points via independent assessments or communication with analysts to drive independent and creative solutions to address these pain points.
  • Performs advanced threat hunting exercises to identify unknown threats within a client environment.
  • Lead incident investigations during client incident response scenarios
  • Participates in monthly status calls with clients to present key metrics and analyst findings.
  • Works as the primary communications channel between the analyst team and other SOC departments, establishing/driving projects based on these communications.
  • Serves as the SME on the security event analysis process and procedures.
  • Works closely with Delivery Managers on client reporting, presentations, and meetings.
  • Designates and drives Short Term Projects based on these evaluations.
  • Performs regular audits to gauge and improve performance including quality reviews (QA/QC) of current analysts based on Key Performance Indicators (KPIs) and provides feedback on improvement points to analysts.
  • Coordinates the implementation and execution of Long-Term Projects that align with managerial expectations as well as SOC wide goals under the guidance of SOC leadership.
  • Expected to conduct 1 week of Analyst II monitoring 2x/year to maintain visibility into analyst workflow, as well as to identify major pain points, and demonstrate leadership.


Required Skills:

  • Basic awareness of cloud technologies as it relates to security (AWS, Azure, GCP)
  • Basic awareness of audit requirements (PCI, HIPAA, SOC, etc.)
  • Strong understanding of IPv4, TCP/IP, low level networking and protocols, TCP/UDP ports and how they relate to security risk landscape.
  • Ability to conduct multi-source threat analysis utilizing SIEM event data.
  • Tier III analyst experience involving host analytics (EDR, Windows event logs, etc.), network-based evidence, and incident investigations.
  • Expert knowledge and experience using SIEM, EDR, vulnerability management, network traffic analysis and other industry standard security technologies for event investigation.
  • Advanced understanding of security relevant log ingestion required to achieve security use cases.


Qualifications:

  • 7+ years of technical experience in Information Security or Network Engineering with at least 3-5 years of experience in a Security Operations Center
  • Ability to work extremely well under pressure while maintaining a professional image and approach.
  • Able to demonstrate integrity, leadership, teamwork, and results.
  • Must be available on a rotational basis to be the designated on-call Senior Analyst during off hours in case of a SOC emergency or inquiry.
  • Able to effectively and independently identify and drive change to improve the Security Analyst team.
  • Strong written, verbal, and non-verbal communication skills, especially conveying complex information in an understandable manner.



EEOC: We are committed to equal employment opportunity without consideration of race, color, religion, ethnicity, citizenship, political activity or affiliation, marital status, age, national origin, ancestry, disability, veteran status, sexual orientation, gender identity, gender expression, sex or gender, or any other basis protected by law.