Overview
On Site
$27 - $27 per hour
Contract - W2
Skills
Jr. SOC Monitoring Analyst (2nd OR 3rd Shift)
Job Details
Job Title: Jr. SOC Monitoring Analyst
Job Location: Farmington CT 06032
Onsite Requirements:
- Passion for Technology, specifically in Cyber Security
- Bachelors in cyber security
- Recent Certifications in Cyber Security (CompTIA Security+)
Job Description:
- The SOC Monitoring Analyst utilizes internal processes and tools to detect and respond to various threats.
Responsibilities:
- Monitor, analyze and investigate alerts from various log sources including IDS/IPS, firewalls, proxies, servers, endpoints and other network devices in an enterprise security information and event monitoring (SIEM).
- Perform appropriate response or escalation activities using established event handling and incident response procedures based on risk categorization.
- Collaborate with peers and stakeholders across the Corporate and Business Unit cyber security and information technology organizations.
- Perform other duties as assigned.
Qualifications:
- Applicable work experience or academic coursework in Network Support, Security Operations and conversant with cyber security concepts and techniques.
- Demonstrable knowledge of networking (TCP/IP, topology, and security), operating systems (Windows/UNIX), and web technologies (Internet security).
- Understand system data, including, but not limited to, security event logs, system logs, and firewall logs.
- Excellent written and verbal communication skills; must be able to communicate technical details clearly and concisely with peers and various levels of management team.
- Capability to think and operate independently or in a team environment with minimal supervision.
- A proactive, analytical and results driven mindset that is highly detail oriented.
- A solid understanding of process documentation and procedures with the ability to develop, revise and execute standard work.
- Organizational skills to manage multiple competing priorities and deadlines in a fast-paced working environment.
- Proven ability to troubleshoot and solve technical issues.
- Candidate should have technical understanding of the following areas:
- Network analysis using tcpdump, Wireshark or other packet capture/inspection tools.
- Searching, interpreting, and working with data from enterprise logging systems including syslog, netflow, Splunk or other SIEM/SIEM platforms.
- Endpoint protection suites such as Symantec, McAfee, Carbon Black, Forcepoint or Tanium.
Education:
- Typically requires a University Degree in Cyber, Computer Science, Computer Information Systems, Information and Technology Systems, Math or Science or related discipline or equivalent work experience or cybersecurity certifications in lieu of degree.
- Security+, Network+, A+, CySA+, GSEC, CEH, GCIH, GIAC or similar certifications are a plus.
- **3rd party and subcontract staffing agencies are not eligible for partnership on this position. 3rd party subcontractors need not apply.
- This position requires candidates to be eligible to work in the United States, directly for an employer, without sponsorship now or anytime in the future.
- This client is a US Federal Government contractor and is legally required to hire s.
- Due to the nature of the work, a United States Government Clearance is required to be eligible for the position**
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.