Lvl 2 SOC Analyst
Posted on Apr 29, 2020 by Request Technology - Kyle Honn
Level II SOC Analyst
3+ years experience of security incident and event management, log analysis, network traffic analysis, malware investigation and remediation, SIEM correlation logic and alert generation.
Security certifications are preferred (CISSP, CEH, CCNA, GCIH, GIAC, etc.).
Understanding of Security principles, techniques and technologies such as SANS Top 20 Critical Security Controls and OWASP Top 10.
Knowledge of SIEM solution such as RSA Security Analytics, ArcSight, LogRhythm, QRadarr, Splunk or similar.
3+ years experience in IT security (Incident response/handling, Firewall Admin, Intrustion Detection, etc.).
Knowledge of networking fundamentals (TCP/IP, Network Layers, etc.) and malware operation and idicators.
Knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.) and security related technologies (SIEM, WAF, IPS, IDS, IRP, EDR, FW, etc.).
Protocol analysis experience (Wireshark, Gigastor, Netwitness, etc.)
Basic knowledge of audit requirements (PCI, HIPPA, SOX, etc.)
Basic programming skills in various disciplines including Scripting languages
If this is an opportunity that you're interested in please email your resume to: