This Job Vacancy has Expired!

SOC Analyst III

Posted on Nov 7, 2019 by Request Technology - Robyn Honquest

Charlotte, NC 28201
IT
Immediate Start
$120k - $130k Annual
Full-Time

SOC Analyst Level 3

Location: Charlotte,NC

Looking for a Level 3 SOC Analyst with 5-7 years experience working with a SIEM, Networking, Incident Response, Incident Handling, Unix Linux

You will work as a tier III analyst in the cyber security operations team and be responsible for carrying out 24x7 on-site security monitoring operations. The Security Analyst (Level 3) will perform responsibilities associated with investigating Incidents escalated from Tier I and II incident responders.

Key Responsibilities

  • Conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats
  • Perform investigation and escalation for complex or high severity security threats or incidents
  • Serve as an escalation resource and mentor for other analysts
  • Work with SIEM Engineering and other security partners developing and refining correlation rules
  • Work on complex tasks assigned by leadership, which may involve coordination of effort among Level 1/2/3 analysts
  • Coordinate evidence/data gathering and documentation and review Security Incident reports
  • Assist in defining and driving strategic initiatives
  • Create and develop SOC processes and procedures working with Level 3, Level 2 and Level 1 Analysts
  • Provide recommendations for improvements to Company's Security Policy, Procedures, and Architecture based on operational insights
  • Define and assist in creation of operational and executive reports
  • Define tool requirements to improve SOC capabilities

Job Qualifications

  • 7+ years of technical experience in Information Security, System Administration, or Network Engineering with at least 5 - 7 years of experience in Information Security
  • Extensive experience in Incident Response, Incident Handling and Security Operations
  • Advanced knowledge and expertise of using SIEM technologies for event investigation
  • Basic understanding of incident handling/incident response techniques within a cloud-based environment such as Google Cloud, Azure or AWS

Security Certifications Preferred

Preferred Competencies

  • Advanced event analysis leveraging SIEM tools
  • Advanced incident investigation and response skill set
  • Advanced log parsing and analysis skill set
  • Advanced knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
  • Advanced knowledge of current threat landscape (threat actors, APT, cyber-crime, etc)
  • Advanced knowledge of malware operation and indicators
  • Advanced knowledge of penetration techniques
  • Moderate to Advanced knowledge of DDoS mitigation techniques
  • Moderate to Advanced knowledge or IDS/IPS systems
  • Moderate to Advanced knowledge of Windows and Unix or Linux
  • Moderate knowledge of Firewall and Proxy technology
  • Moderate knowledge of Data Loss Prevention monitoring
  • Moderate knowledge and experience with Cloud technologies (Amazon, Azure, Google Cloud)
  • Moderate experience with Scripting
  • Moderate knowledge of forensic techniques
  • Moderate protocol analysis experience (Wireshark, Gigastor, Netwitness, etc.)
  • Moderate knowledge of audit requirements (PCI, HIPPA, SOX, etc.)

Reference: 791459548

Set up alerts to get notified of new vacancies.

Similar Jobs

SOC Analyst III

Charlotte, NC

$120k - $130k Annual