Required::::::::::: SOC Analyst::::::::San Francisco CA(USC or GC and Local Only) at Francisco, Indiana, USA |
Email: [email protected] |
Hi, Hope you are doing well. Below is the very urgent requirement please reviews it and let me know your interest in this requirement. Would appreciate if you can also share your updated resume. Title: SOC Analyst Location: San Francisco CA Duration: 6-12+ Months Position Summary Under the leadership of the Manager, Security Operations Center (SOC), the SOC Analyst Tier 3 (SOC3) will ensure delivery of the highest level of service in the support of conducting security event monitoring and analysis as well as incident response. Responsibilities will include the day-to-day (24x7) operations to include the application of analytic and technical skills to investigate intrusions, identify malicious activity and potential insider threats, and perform incident response. The SOC3 will also work other SOC and threat management staff with development and enhancement of existing detection and response capabilities including creation of SIEM content, IDS rules, SOP documentation, and implementation of incident response methodologies. Essential Job Functions 1. Perform operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from SIEM monitoring tools, network and host-based intrusion detection systems, firewall logs, system logs (Unix & Windows). 2. Responsible for responding to security incidents (malware infections, unauthorized access, malicious emails, DDoS attacks) and elevating to Threat Management team as needed. 3. Analyze security event logs and alerts to determine validity, priority and impact against both security threat best practices and corporation policies. 4. Evaluate the type, nature and severity of security events with a range of security event analysis tools. 5. Conduct active and passive analysis of network traffic, operating systems, and host activity across all technologies and platforms, through security tools and sandbox environments. 6. Perform incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts. 7. High understanding of processes related to threat correlation and mitigation. 8. Experience leading as an Incident Response Coordinator 9. Documenting security investigations through standard procedures: 1. Recording full SOC Analyst response through remediation actions 2. Completing a security AAR 3. Completing a risk assessment as required 1. Completion of security risk assessments 2. Process assigned SOC queue tickets submitted by Crown Castle users and the IT Service Desk. 3. Completion of weekly Social Media Report 4. Additional Project Work as assigned. Education/Certifications 1. Bachelor's degree in IT or Computer Security or comparable years experience. 2. Must have at least one of the following certifications: CISSP, CCE, PMP, GSEC, CCNA Cyber Ops, CISF-GIAC Information Security Fundamentals, CISM, CRISC, Security+, CEH and GISF Experience/Minimum Requirements 1. 5+ years of experience in IT Security monitoring 2. Tier 3 incident response experience 3. Experience in SIEM event auditing, log review and incident response 4. Windows and Linux System administration preferred. Other Skills/Abilities 1. Demonstrates a profound sense of ethics, integrity, and confidentiality 1. Finds common ground and viable solutions to complex problems in a compelling manner while maintaining a professional composure 2. Influences across a diverse discipline in a collaborative, risk aware manner 3. Organized, responsible and highly thorough problem solver 4. Proven ability to create and build new processes 5. Great verbal and written communication skills and attention to detail 6. Self-starter who can work independently as well as in a team setting 7. Works well with people from different areas of the business 8. Ability to simplify complex technical topics 9. Ability to learn, understand, and apply new technologies 10. Ability to design and implement effective policies to achieve consistent team results. 11. Demonstrates a "learning agility" to remain current in subject matter expertise 12. Experience documenting enterprise security events 13. Navigate ambiguity; Is adaptable to, and champions change 14. Giving and receiving effective feedback across all interactions Best Regards, Harsh Chaudhary Technical Recruiter 1Points LLC [email protected] || www.1pointsys.com 115 Stone Village Drive Suite C Fort Mill, SC 29708 An E-Verified company | An Equal Opportunity Employer linkedin.com/in/harsh-chaudhary-702641198 The content of this email is confidential and intended for the recipient specified in message only. It is strictly forbidden to share any part of this message with any third party, without a written consent of the sender. If you received this message by mistake, please reply to this message and follow with its deletion, so that we can ensure such a mistake does not occur in the future Is it necessary to print this email If you care about the environment like we do, please refrain from printing emails. It helps to keep the environment forested and litter-free. -- Keywords: information technology California South Carolina |
[email protected] View all |
Tue Feb 13 03:06:00 UTC 2024 |