Senior SOC Analyst

Overview

On Site
$102,000 - $138,000 annually
Full Time

Skills

SIEM
Use Cases
System On A Chip
Continuous Improvement
Research
Security Operations
Cyber Security
CISSP
Certified Ethical Hacker
Network
Endpoint Protection
Incident Management
International Relations
Investor Relations
Information Retrieval
Forensics
Log Analysis
Cloud Computing
Microsoft Azure
Amazon Web Services
Google Cloud
Google Cloud Platform
Scripting
Python
Windows PowerShell
Analytical Skill
Problem Solving
Conflict Resolution
Communication
Artificial Intelligence
Messaging

Job Details

RESPONSIBILITIES:
Kforce has a client that is seeking a Senior SOC Analyst in Jacksonville, FL. We are looking for a Senior SOC Security Analyst to join the Security Operations Center (SOC) team and support threat detection and incident response (IR) for Kforce and its subsidiary environments.

Duties and Responsibilities:
* Senior SOC Analyst will transform security operations, leverage advanced security technologies, automation, and AI to protect one of the leading Title and Escrow providers in the Nation from cyber threats
* Utilizes next gen XDR and SIEM capabilities to perform analysis on high alerts, proactive threat hunting and investigations on complex cyber events
* Owns and leads individual incident response activities by analyzing security alerts and coordinating responses; Perform in-depth event review and analysis where appropriate; Analyze events, research the potential cause, and recommend a course of action
* Designs modern detective controls for emerging security risks and involved in innovative programs to enhance the firm's security posture
* Hunts for indications of compromise across multiple technology platforms
* Continuously improves our alerting use cases and the threat hunting program
* Stays updated on the latest security trends, vulnerabilities, and threat actors to continually improve the organization's security posture
* As a Senior SOC Analyst, you will participate in on-call rotation schedule to provide 24/7 coverage for security incidents and emergencies
* Documents/generates reports detailing security incidents for security leaders and the business
* Conducts postmortem reviews of incident response (IR) activities, to facilitate continuous improvement
* Research security trends with the goal of improving our processes and tools

REQUIREMENTS:
* Bachelor's degree in Computer Science or related field or the equivalent combination of education, training, and work experience
* Requires 5-7+ years of experience working in a Security Operations role
* Threat hunting experience
* Familiarity with known cyber security frameworks including NIST, MITRE ATT&CK, and fundamentals of kill chain analysis
* Hands-on working knowledge of Cortex XDR and/or Cortex XSIAM

Preferred:
* Relevant industry certifications such as CISSP, GIAC, or CEH
* Familiarity with the principles of network and endpoint security, current threat, and attack trends, and have working knowledge of security principles such as -defense in depth-
* Familiarity with performing security Incident Response (IR) activities in complex organizations, with familiarity of the following: Endpoint Detection and Response (EDR) or Endpoint Forensics, Network Log Analysis, Public Cloud Defense (Azure, AWS, Google Cloud Platform, etc.)
* Scripting knowledge (Python, PowerShell, etc.)
* Forensic knowledge
* Excellent analytical and problem-solving skills
* Strong communication skills, both spoken and written
* Ability to assess and prioritize risks associated with alerts and events based on both industry knowledge and organizational context

The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.

We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.

Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.

This job is not eligible for bonuses, incentives or commissions.

Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Kforce Technology Staffing