Security Operations Center (SOC) Analyst II, Location: Remote, Experience: 10+ Years experience, Duration: 6+ Months contract

Overview

Remote
Depends on Experience
Contract - W2
Contract - Independent

Skills

OSI Model
TCP/IP
DNS (Domain Name System)
HTTP
SMTP)
System Administration and/or Architecture
Windows
Unix/Linux and OSx.Previous experience operating and tuning SIEM tools
IBM QRadar
ash
python
ruby

Job Details

Hi,

Please find the role below and let us know your interest.

Role: Security Operations Center (SOC) Analyst II

Location: REMOTE

Experience: 10+ years exp.

Security Operations Center (SOC) Analyst II:

As technology continues to advance so does the threat landscape. Attackers are now using more sophisticated tactics to evade security controls. As a result, continue to advance its capabilities in threat detection and monitoring systems.

The SOC Tier II Analyst is responsible for monitoring, analysis, response, and escalation of security incidents and events. The Security Operations Center is the first line of detection and defense which actively monitors the SIEM (Security Information & Event Management), reviews log and event data, and works tickets associated with said data. Providing research using internal and open source tools, resolving and escalating incidents using established policies and procedures.

How You Will Make a Difference:

  • Monitoring and analysis of logs, alerts, and external data sources to determine any security and/or operational impact to the organization.
  • Performs research on security events and threat intelligence data using internal and open source tool. Performing proactive threat research and validation for security event data generated from monitoring tools and/or manual analysis.
  • Creation of Reference Sets within the SIEM tool to assist Tier 1 SOC Analysts with threat research.
  • Monitoring IPS (Intrusion Prevention System) events and performing analysis on the data providing recommended actions or escalating to incident analysts for further review.
  • Trains all new SOC Tier I Analysts in the usage or all security tools and the execution of all SOC procedures.
  • Acts as an escalation point for the Tier I SOC Analysts. Resolves or escalates cyber security incidents and events as part of the established policies and procedures.
  • Assists with the containment of threats and remediation of the environment during or following an incident.
  • Collaborates with technical teams to identify, resolve, and mitigate security events as part of the Incident Response Plan.
  • Evaluates unwarranted changes within the environment as part of monitoring rules within the SIEM tool.
  • Creates and executes SOC compliance reports as necessary for risk and compliance teams.
  • Monitors SIEM environment for Global organization, providing resolution to events and incidents triggered within the SIEM tool as part of the day to day operations.
  • Ensures that critical infrastructure is reporting into the SIEM and reports any systems that are not reporting to the appropriate team/s.
  • Performs documentation of event analysis and records this data within our Incident Tracking tool. Ensuring all relevant data is captured within each incident.
  • Assists with the triage of service requests from internal teams within the organization through our incident ticketing system.
  • Enhances detections, alerts, and other cyber event correlation rules within the SIEM to reduce false positives.
  • Approves various block requests originated by the Tier I SOC Analysts.
  • Manages the SOC documentation repository by providing oversight of the annual SOC Documentation review process. Provides recommendations for procedural updates and improvements. Reviews recommendations proposed by Tier I SOC Analysts.
  • Represent the Security Operations team in various SOC, Incident Response, and Cyber Security projects.

Years of Related Professional Experience: 10+ years

Educational/ Position Requirements:

Position Requirements:

  • Experience executing security incident handling processes and procedures.
  • Working knowledge of Networking fundamentals including but not limited to; The OSI Model, TCP/IP, DNS (Domain Name System), HTTP, SMTP), System Administration and/or Architecture.
  • Proficient understanding of various Operating Systems and their architectures: Windows, Unix/Linux and OSx.
  • Previous experience operating and tuning SIEM tools, IBM QRadar experience preferred.
  • Effective communication skills with the ability to work in a highly collaborative environment across many different disciplines.
  • Strong relationship skills and collaborative style to enable success across multiple business partners with a focus on building partnerships.
  • Excellent analytical and problem-solving skills.
  • Scripting capabilities in bash, python, ruby considered a plus.

Educational Requirements:

  • A bachelor s degree in computer science, information systems or other related field (preferred); or equivalent work experience.
  • Professional security management certifications such as; Global Information Assurance Certification (GIAC) certifications such as GCIA, GCIH, Certified Information Systems Security Professional (CISSP) or other similar credentials are a plus.

Special Physical and/or Mental Requirements:

  • Minimal travel requirements