TIER1/2 SOC Analyst

Overview

On Site
Contract - W2

Skills

Tier 1
Security operations
Cloud security
Incident management
Tier 2
Tier 3
Issue tracking
Knowledge management
Customer service
Training and development
System on a chip
Banking
Marketing intelligence
Project management
Leadership
Management
DLP
SAP BASIS
Policies
Exceed
Network
Cloud computing
SIEM
Documentation
Collaboration
Operations
MEAN stack

Job Details

Software Guidance & Assistance, Inc., (SGA), is searching for a TIER 1 SOC Analyst for a CONTRACT/RIGHT TO HIRE assignment with one of our premier Banking clients in Auburn Hills/Farmington Hills MI.

1x a week HYBRID onsite in Auburn Hills to start.
IN the future - the possibility of 2-3 days onsite in Farmington but that would happen end of Q1 2024.

Rotation Shifts - ALL EST times

8am-5pm
1230pm-830pm
8pm- 4am
4am-1230pm Summary/Basic Purpose: Provide a detailed overview of the position including its purpose and desired results. Describe leadership responsibility if a management position. Use paragraph form. The Security Operations Center is responsible for providing 24/7, 365 monitoring, detection, and response capabilities for Comerica. This includes event, cloud security, and DLP monitoring, as well as a role in the incident response process. The Tier 1 SOC analyst primarily serves as the initial triage and investigation point for the SOC and would escalate incidents on an as needed basis.

The Tier 1 Security Operation Center (SOC) Analyst is responsible for proactively monitoring and performing initial triage / investigation of security incidents and alerts to identify any malicious activity. Besides the initial triage and investigation, Tier 1 Analysts are expected to escalate security incidents according to defined escalation policies to Tier 2, Tier 3, and SOC leadership for further investigation / response. Essential Duties/Responsibilities: List the essential duties and responsibilities of the job. Each duty/responsibility should represent at least 10% of the job, totaling 100%, not to exceed 7 items. Duties/Responsibilities: % of Time Required: SOC Analysis
  • Monitor security incidents for, endpoints, network, and cloud domains, being generated by the SIEM tool and ticketing system.
  • Initial triage and investigation of incidents assigned through the ticketing system, following established playbooks for specific incident types.
  • Respond, mitigate, and eradicate security threats, with guidance from Tier 2, Tier 3 analysts, as well as SOC leadership.
80% Documentation and Support
  • Provide consistent and quality documentation of actions taken to triage / investigate incidents.
  • Assist senior staff in development of documentation / knowledge management articles for the SOC.
  • Handle sensitive information in accordance with the Corporate Information Protection Policy.
  • Collaborate with other Engineering and Operations teams to troubleshoot, respond, and improve detection capabilities.
10%
SGA is a technology and resource solutions provider driven to stand out. We are a women-owned business. Our mission: to solve big IT problems with a more personal, boutique approach. Each year, we match consultants like you to more than 1,000 engagements. When we say let's work better together, we mean it. You'll join a diverse team built on these core values: customer service, employee development, and quality and integrity in everything we do. Be yourself, love what you do and find your passion at work. Please find us at .

EEO Employer: Race, Color, Sex, Sexual Orientation, Gender Identity, Religion, National Origin, Disability, Veteran Status, Age, Marital Status, Pregnancy, Genetic Information, or Other Legally Protected Status.