Home

SOC ANALYST :: Local to Michigan :: Only USC & GC (Minimum 8 Years Consultant) at Michigan, North Dakota, USA
Email: avinash@zealhire.com
From:

Avinash Kumar,

ZealHire Inc

avinash@zealhire.com

Reply to:   avinash@zealhire.com

SOC ANALYST

USC/GC

Local to MI

$45-50/hr on C2C

Need skills matrix 

resume must be under 5 pages

SOC Tier I analyst

Farmington Hills, MI ( Onsite)

Shift Time -

Sunday                23:00-24:00 ( 11pm to 12 am)

Monday              24:00-8:00, 23:00-24:00 ( 12 am -8 am)

Tuesday              24:00-8:00, 23:00-24:00

Wednesday        24:00-8:00, 23:00-24:00

Thursday            24:00-8:00, 23:00-24:00

Friday                  24:00-8:00

AM feedback on job description based on previous positions: clear, direct communication, must be local (not open to relocation)

Managers preferences on soft skills/personalities:

Preferred Location(s):

       GLC (Great Lakes Campus): 36455 & 36555 Corporate Dr. Farmington Hills, MI 48331

Onsite Requirements:

*Hybrid onsite requires a minimum of 2 full days onsite (8hrs/day x 2 days).  On resume submittals, list hybrid.  Do not list the candidate can work onsite 2 days/week.

CMA Department: Enterprise Security

Qualification Metrics/Additional Skills (Required Skills)

 SOC Experience,

Intrusion Detective

Security Scanning

Security Log Detection

Analyzing security events

RESPONSIBILITIES:

Work in a 24/7 Global SOC Team that operates in three shifts Conduct preliminary incident triage according to the Security Incident Management Triage Matrix and set the priority, provide analysis, determine, track remediation, and escalate as appropriate. Utilize the intrusion detection, security scanning, security log collection, content filtering, and other security-related systems to perform triage and investigation and incident response Provide support for security incidents coordination, by using different communication means. Ensure the SOC team documentation is up to date, including investigation Playbooks and Standard Operating Procedures as well incidents have current notes related to investigation steps which were performed. Categorization and prioritization of security incidents Looking for the correlation between various security events 

The Security Operations Center is responsible for providing 24/7, 365 monitoring, detection, and response capabilities for Comerica. This includes event, cloud security, and DLP monitoring, as well as a role in the incident response process. The Tier 1 SOC analyst primarily serves as the initial triage and investigation point for the SOC and would escalate incidents on an as needed basis.

The Tier 1 Security Operation Center (SOC) Analyst is responsible for proactively monitoring and performing initial triage / investigation of security incidents and alerts to identify any malicious activity. Besides the initial triage and investigation, Tier 1 Analysts are expected to escalate security incidents according to defined escalation policies to Tier 2, Tier 3, and SOC leadership for further investigation / response.

Duties/Responsibilities:

SOC Analysis
Monitor security incidents for, endpoints, network, and cloud domains, being generated by the SIEM tool and ticketing system.
Initial triage and investigation of incidents assigned through the ticketing system, following established playbooks for specific incident types.
Respond, mitigate, and eradicate security threats, with guidance from Tier 2, Tier 3 analysts, as well as SOC leadership.

Documentation and Support
Provide consistent and quality documentation of actions taken to triage / investigate incidents.
Assist senior staff in development of documentation / knowledge management articles for the SOC.
Handle sensitive information in accordance with the Corporate Information Protection Policy.
Collaborate with other Engineering and Operations teams to troubleshoot, respond, and improve detection capabilities.

Skills:
Solid understanding of Cybersecurity concepts and frameworks.
Proven, excellent analytical skills.
Working knowledge in the use of tools such as SIEM / IT Ticketing technologies, EDR, Email Gateways, Malware Analysis Sandbox.
Understanding of networking (TCP/IP networks and protocols) concepts.
Understanding of phishing and malware techniques
Strong written and oral communication, documentation, and organizational skills

Keywords: access management information technology green card Michigan
SOC ANALYST :: Local to Michigan :: Only USC & GC (Minimum 8 Years Consultant)
avinash@zealhire.com
https://jobs.nvoids.com/job_details.jsp?id=1999036
avinash@zealhire.com
View All
08:02 PM 10-Dec-24


To remove this job post send "job_kill 1999036" as subject from avinash@zealhire.com to usjobs@nvoids.com. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to avinash@zealhire.com -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at me@nvoids.com


Time Taken: 0

Location: ,