SLG- RT -1353 - Sr SOC Analyst at Brooklyn, New York, USA |
Email: [email protected] |
From: Praveen Pasumarthi, Sligo Soft [email protected] Reply to: [email protected] Greetings from Sligo Software Solutions, Inc. !! SLIGO is a Software Development & IT Consulting company. We have around 100+ IT associates working with our esteemed clients across several domains such as IT, Banking, Healthcare, and Government. We have an urgent requirement for Senior SOC Analyst - Security Operations Center analyst position with our client. Position: Senior SOC Analyst - Security Operations Center analyst. Location: Brooklyn Tech, Brooklyn NY , NY Night Shift: 6.00 pm to 6.00 am( including weekend. Hours: 35 hours /wk Duration: 2 years MANDATORY SKILLS/EXPERIENCE Note: Candidates who do not have the mandatory skills will not be considered Minimum 8 years of experience in Threat Management/SOC/Incident Response environment. For this senior position, leadership skills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively. Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools Knowledge of cybersecurity principles, practices, and procedures Strong understanding of network and host technologies Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies. Experience with SIEM technologies, malware analysis and mitigation techniques Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation) Interpret information collected by diagnostic network tools (Netflow, security event logs, IDS systems, etc.) Ability to investigate and solve complex problems. Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management. Threat Hunting: Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents. Incident Response: Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently Keywords: access management information technology New York SLG- RT -1353 - Sr SOC Analyst [email protected] |
[email protected] View all |
Thu Sep 12 01:46:00 UTC 2024 |