Overview
On Site
100k - 135k
Full Time
Skills
Tier 2
Security operations
Incident management
Threat analysis
Network protocols
Microsoft Excel
System administration
Active Directory
Risk assessment
Computer science
IT security
Information security
Data Analysis
Process engineering
System on a chip
Manufacturing
Recruiting
Data
Network
SIEM
Microsoft
Firewall
Microsoft Windows
Wireshark
Management
DLP
Virtual private network
Python
Software development
Windows PowerShell
IPS
NAC
Unix
Communication
SAP BASIS
Job Details
Our client, a global consumer manufacturing company, is hiring a Tier 2 SOC Analyst for their Security Operations Center on Long Island.
As a Tier 2 SOC Analyst, you'll analyze data, develop incident response processes, and conduct in-depth analysis of network and endpoint data. Utilize technologies like SIEM, EDR, and threat intelligence sources to enhance detection and mitigation strategies.
Required Skills & Experience:
What You Will Be Doing:
Tech Breakdown:
Daily Responsibilities:
The Offer:
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.
#LI-DI1
As a Tier 2 SOC Analyst, you'll analyze data, develop incident response processes, and conduct in-depth analysis of network and endpoint data. Utilize technologies like SIEM, EDR, and threat intelligence sources to enhance detection and mitigation strategies.
Required Skills & Experience:
- Hands-on experience with SIEM (Microsoft Sentinel an advantage), EDR, Anti-Virus, Firewall, Network protocols, Windows security events, Phishing mitigation, WireShark, MS Office (Excel in particular).
- Minimum 3 years of experience in security and network or systems operations combined.
- Familiarity with Permissions management, DLP, Active Directory, VPN, Python (or any high-level programming language).
- Good knowledge with CASB, SOAR, Powershell, IPS, NAC, UNIX Shells.
- Deep understanding and proficiency in performing risk assessment for an enterprise.
- Bachelor's degree in Computer Sciences (Computer Security/Information Security degree preferred), or equivalent experience.
What You Will Be Doing:
Tech Breakdown:
- 25% SIEM (Microsoft Sentinel)
- 20% EDR
- 15% Anti-Virus
- 10% Firewall
- 10% Network protocols
- 10% Phishing mitigation
- 10% Others (WireShark, MS Office)
Daily Responsibilities:
- 30% Data analysis and incident investigation
- 25% Incident response process development
- 20% Threat intelligence utilization
- 15% Communication with technical and business-oriented teams
- 10% Process adherence and improvements
The Offer:
- Attractive annual discretionary bonus
- Robust suite of employee benefits
- Opportunities for career advancement and continuous learning
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.
#LI-DI1