This Job Vacancy has Expired!

SOC Analyst Level 3

Posted on Sep 19, 2019 by Request Technology

Charlotte, NC 28201
IT
Immediate Start
$130k - $135k Annual
Full-Time

A prestigious company is on the search for a SOC Analyst Level 3. This individual needs to have 5-7 years of SOC experience and using SIEM technologies for event investigation. They need to have extensive knowledge and experience with incident response, incident handling and security operations. For this role, you need to have basic understanding of incident handling/incident response techniques within a cloud based environment like Google Cloud, Azure, or AWS. For this role you also need to have advanced knowledge of IDS/IPS systems.

Key Responsibilities

  • Conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats
  • Perform investigation and escalation for complex or high severity security threats or incidents
  • Serve as an escalation resource and mentor for other analysts
  • Work with SIEM Engineering and other security partners developing and refining correlation rules
  • Work on complex tasks assigned by leadership, which may involve coordination of effort among Level 1/2/3 analysts
  • Coordinate evidence/data gathering and documentation and review Security Incident reports
  • Assist in defining and driving strategic initiatives
  • Create and develop SOC processes and procedures working with Level 3, Level 2 and Level 1 Analysts
  • Provide recommendations for improvements to Company's Security Policy, Procedures, and Architecture based on operational insights
  • Define and assist in creation of operational and executive reports
  • Define tool requirements to improve SOC capabilities

Job Qualifications

  • 7+ years of technical experience in Information Security, System Administration, or Network Engineering with at least 5 - 7 years of experience in Information Security
  • Extensive experience in Incident Response, Incident Handling and Security Operations
  • Advanced knowledge and expertise of using SIEM technologies for event investigation
  • Basic understanding of incident handling/incident response techniques within a cloud-based environment such as Google Cloud, Azure or AWS

Security Certifications Preferred:

  • Certified Incident Handler (GCIH)
  • Certified Intrusion Analyst (GCIA)
  • Certified Penetration Tester (GPEN)
  • Certified Ethical Hacker (CEH)
  • Certified Expert Penetration Tester (CEPT)
  • Certified Information Systems Security Professional (CISSP)
  • Networking Certifications (CCNA, etc.)
  • Platform Certifications (Microsoft, Linux, Solaris, etc.)

Preferred Competencies

  • Advanced event analysis leveraging SIEM tools
  • Advanced incident investigation and response skill set
  • Advanced log parsing and analysis skill set
  • Advanced knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
  • Advanced knowledge of current threat landscape (threat actors, APT, cyber-crime, etc)
  • Advanced knowledge of malware operation and indicators
  • Advanced knowledge of penetration techniques
  • Moderate to Advanced knowledge of DDoS mitigation techniques
  • Moderate to Advanced knowledge or IDS/IPS systems
  • Moderate to Advanced knowledge of Windows and Unix or Linux
  • Moderate knowledge of Firewall and Proxy technology
  • Moderate knowledge of Data Loss Prevention monitoring
  • Moderate knowledge and experience with Cloud technologies (Amazon, Azure, Google Cloud)
  • Moderate experience with Scripting
  • Moderate knowledge of forensic techniques
  • Moderate protocol analysis experience (Wireshark, Gigastor, Netwitness, etc.)
  • Moderate knowledge of audit requirements (PCI, HIPPA, SOX, etc.)

Reference: 758785605

Set up alerts to get notified of new vacancies.

Similar Jobs

SOC Analyst Level 3

Charlotte, NC

$130k - $135k Annual

SOC Analyst III

Charlotte, NC

$120k - $130k Annual