Cybersecurity Defense SOC Analyst (L2)

Remote Full-time
About the positionResponsibilities• Monitor our security tools to triage and respond to suspicious events and abnormal activities, capable of performing deep-dive incident investigations. • Serve as a point of escalation for the L1, L2 SOC Analysts, and the point of contact for our MSSP, coordinating response efforts with other groups and stakeholders with varying technical expertise, such as IT, Legal, business etc. • Develop and implement advanced security protocols and incident response procedures and improve our threat intelligence processes.• Stay current with evolving threats, vulnerabilities, tools, technologies and threat actor TTPs to help improve detection and response capabilities. • Provide oversight and governance over the daily operations of the MSSP and SOC team at a global level. • Mentor and provide training to junior SOC team members. • Develop and refine standard operating procedures in the form of run books and playbooks for incident response and threat detection. • Conduct technical analysis, log reviews, and assessments of cybersecurity incidents throughout the incident management lifecycle.• Work with end users where appropriate on security related incident and request workflow. • Document and manage incident cases to utilize information for stakeholder engagement to provide insight, intelligent recommendations, risk reporting and lessons learned. • Work in scheduled shift patterns when required. • Conduct in-depth security investigations, log analysis, network/email traffic assessment, and evaluate other data sources to identify root causes, assess impact, and gather evidence for response and mitigating actions.• Implement detection use cases within our SIEM for our expanding estate using appropriate scripting languages. • Manage log sources, log ingestion volumes, detection content and overall SIEM solution system health, maintenance, and upgrades. • Assist with additional ad hoc projects as required. Requirements• Cybersecurity related bachelor's degree or related field. • Minimum of 8 years of experience in a security operations role, SOC engineering and or a cybersecurity technical engineering role. • Exposure to building and migrating log sources onto a new SIEM platform, creating detection content, log parsers and detection engineering will be preferred.• Preference will be given to candidates who also have additional technical and cybersecurity certifications covering both defensive and offensive security such as CompTIA Security+, Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), CySA+, CISSP, GSEC, GCIH, CCSP, Microsoft SC-200, CISSP-ISSMP, CTIA, OSCP. • Candidates must have solid experience and knowledge of typical enterprise technologies. On-premises and cloud hosting, Windows and Linux operating systems (OS), Microsoft Azure, M365 and the ability to detect signs of compromise in these systems.• Possess a growth mindset and is willing to learn how to resolve technical security issues. • Demonstrate a working and genuine interest and talent in Cybersecurity. • Demonstrate detail orientation and can take a structured approach to procedures and working instructions. • Work and maintain a calm structured mindset even when under pressure. • Possess an aptitude for understanding and analyzing data when troubleshooting. • Strong written communication, critical thinking, and analysis skills, including the ability to present potential risks and actual findings to a wide audience.• Ability to communicate complex problems to a non-technical audience. • Must have a working understanding of key security concepts and attack types such as phishing, malware, vulnerabilities, Cyber Kill Chain, and attack stages. • A strong analytical mindset, capable of digesting a wide range of information to make practical judgements based on available data and context. • Experience with security tools and technologies, including SIEM, intrusion detection systems, EDR, XDR, log analysis, and malware analysis.• Understand threat actor tactics, techniques and procedures, have familiarity with the MITRE-ATT&CK Framework and different stages of an attack lifecycle. • Maintain a desire to keep learning, with a curious and creative growth mindset. Benefits• Health and WelfareBenefits: Medical (including prescription coverage), Dental, Vision, Health Savings Account, Commuter Account, Health Care and Dependent Care Flexible Spending Accounts, Life Insurance, AD&D, Work/Life Resources (including Employee Assistance Program), and more• LeaveBenefits: Paid holidays, annual Paid Time Off (includes paid state /local paid leave where required), Short-term Disability, Long-term Disability, Other leaves (e.g., Bereavement, FMLA, Adoption, Maternity, Military, Primary & Non-Primary Caregiver)• RetirementBenefits: Contributory Savings Plan (401k) Apply tot his job
Apply Now →
← Back to Home