This Job Vacancy has Expired!

Lvl 3 SOC Analyst

Posted on Oct 3, 2019 by Request Technology - Kyle Honn

Charlotte, NC 28201
IT
Immediate Start
$100k - $130k Annual
Full-Time

Level 3 SOC Analyst

The Incident Handling/Incident Response (IH/IR) team utilizes multiple security technologies and produces enhancements that allow SOC members to work collaboratively and efficiently while responding to threats. The individual in this role will work as the technical lead of a cyber security operations team and be responsible for carrying out 24x7 on-site security monitoring operations. The Security Analyst (Level 3) Lead will perform responsibilities as the technical lead and incident responder for Company's Security Operations Center (SOC), leading technical investigations for security incidents, overseeing process improvements, and driving implementation of new capabilities. He/she will serve as a technical escalation resource for other SOC Analysts and provide mentoring for skill development. The individual will partner with Security Engineers to implement and improve technology and process to enhance SOC monitoring, investigation, and response.

Responsibilities

  • Conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats
  • Perform investigation and escalation for complex or high severity security threats or incidents
  • Serve as an escalation resource and mentor for other analysts
  • Work with SIEM Engineering and other security partners developing and refining correlation rules
  • Work on complex tasks assigned by leadership, which may involve coordination of effort among Level 1/2/3 analysts
  • Coordinate evidence/data gathering and documentation and review Security Incident reports
  • Assist in defining and driving strategic initiatives
  • Create and develop SOC processes and procedures working with Level 3, Level 2 and Level 1 Analysts
  • Provide recommendations for improvements to Company's Security Policy, Procedures, and Architecture based on operational insights
  • Define and assist in creation of operational and executive reports
  • Define tool requirements to improve SOC capabilities
  • Provide leadership and technical guidance in project planning, task definition, estimating, reporting, scheduling, documentation, and workflow

Qualifications

  • 10+ years of technical experience in Information Security, System Administration, or Network Engineering with at least 5 - 10 years of experience in Information Security
  • Extensive experience in Incident Response, Incident Handling and Security Operations
  • Advanced knowledge and expertise of using SIEM technologies for event investigation
  • Basic understanding of incident handling/incident response techniques within a cloud-based environment such as Google Cloud, Azure or AWS
  • Any professional certifications are highly preferred (CISSP, GCIH, CEH, CCNA, GPEN, etc.)
  • Platform Certifications (Microsoft, Linux, Solaris, etc)
  • Advanced event analysis leveraging SIEM tools
  • Advanced incident investigation and response skill set
  • Advanced log parsing and analysis skill set
  • Advanced knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
  • Advanced knowledge of current threat landscape (threat actors, APT, cyber-crime, etc)
  • Advanced knowledge of malware operation and indicators, pen testing, DDoS mitigation techniques, IDS/IPS, etc.
  • Moderate knowledge of Firewall and Proxy technology, DLP, Cloud, Scripting, Protocol analysis, audit, etc.

If this is an opportunity that you're interested in please email your resume to:

(see below)


Reference: 765647779

Set up alerts to get notified of new vacancies.

Similar Jobs

Lvl 3 SOC Analyst

Charlotte, NC

$100k - $130k Annual