Hiring Now : : SR. SOC analyst Tier 3 : : Remote at Remote, Remote, USA |
Email: [email protected] |
From: Surya kanta pradhan, Vyze inc. [email protected] Reply to: [email protected] Position: SR. SOC analyst Tier 3 Duration: 6 months Location; Remote Job Description: Perform operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from SIEM monitoring tools, network and host-based intrusion detection systems, firewall logs, system logs (Unix & Windows). Responsible for responding to security incidents (malware infections, unauthorized access, malicious emails, DDoS attacks) and elevating to Threat Management team as needed. Analyze security event logs and alerts to determine validity, priority and impact against both security threat best practices and corporation policies. Evaluate the type, nature and severity of security events with a range of security event analysis tools. Conduct active and passive analysis of network traffic, operating systems, and host activity across all technologies and platforms, through security tools and sandbox environments. Perform incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts. High understanding of processes related to threat correlation and mitigation. Experience leading as an Incident Response Coordinator Documenting security investigations through standard procedures: o Recording full SOC Analyst response through remediation actions o Completing a security AAR o Completing a risk assessment as required Completion of security risk assessments Process assigned SOC queue tickets submitted by Crown Castle users and the IT Service Desk. Completion of weekly Social Media Report Additional Project Work as assigned. Education/Certifications Bachelor's degree in IT or Computer Security or comparable years experience. Must have at least one of the following certifications: CISSP, CCE, PMP, GSEC, CCNA Cyber Ops, CISF-GIAC Information Security Fundamentals, CISM, CRISC, Security+, CEH and GISF Experience/Minimum Requirements 5+ years of experience in IT Security monitoring Tier 3 incident response experience Experience in SIEM event auditing, log review and incident response Windows and Linux System administration preferred. Other Skills/Abilities Demonstrates a profound sense of ethics, integrity, and confidentiality Finds common ground and viable solutions to complex problems in a compelling manner while maintaining a professional composure Influences across a diverse discipline in a collaborative, risk aware manner Organized, responsible and highly thorough problem solver Proven ability to create and build new processes Great verbal and written communication skills and attention to detail Self-starter who can work independently as well as in a team setting Works well with people from different areas of the business Ability to simplify complex technical topics Ability to learn, understand, and apply new technologies Ability to design and implement effective policies to achieve consistent team results. Demonstrates a "learning agility" to remain current in subject matter expertise Experience documenting enterprise security events Navigate ambiguity; Is adaptable to, and champions change Giving and receiving effective feedback across all interactions Keywords: information technology |
[email protected] View all |
Tue Feb 13 06:02:00 UTC 2024 |