SOC ANALYST :: Local to Michigan :: Only USC & GC (Minimum 8 Years Consultant) at Michigan, North Dakota, USA |
Email: avinash@zealhire.com |
From: Avinash Kumar, ZealHire Inc avinash@zealhire.com Reply to: avinash@zealhire.com SOC ANALYST USC/GC Local to MI $45-50/hr on C2C Need skills matrix resume must be under 5 pages SOC Tier I analyst Farmington Hills, MI ( Onsite) Shift Time - Sunday 23:00-24:00 ( 11pm to 12 am) Monday 24:00-8:00, 23:00-24:00 ( 12 am -8 am) Tuesday 24:00-8:00, 23:00-24:00 Wednesday 24:00-8:00, 23:00-24:00 Thursday 24:00-8:00, 23:00-24:00 Friday 24:00-8:00 AM feedback on job description based on previous positions: clear, direct communication, must be local (not open to relocation) Managers preferences on soft skills/personalities: Preferred Location(s): GLC (Great Lakes Campus): 36455 & 36555 Corporate Dr. Farmington Hills, MI 48331 Onsite Requirements: *Hybrid onsite requires a minimum of 2 full days onsite (8hrs/day x 2 days). On resume submittals, list hybrid. Do not list the candidate can work onsite 2 days/week. CMA Department: Enterprise Security Qualification Metrics/Additional Skills (Required Skills) SOC Experience, Intrusion Detective Security Scanning Security Log Detection Analyzing security events RESPONSIBILITIES: Work in a 24/7 Global SOC Team that operates in three shifts Conduct preliminary incident triage according to the Security Incident Management Triage Matrix and set the priority, provide analysis, determine, track remediation, and escalate as appropriate. Utilize the intrusion detection, security scanning, security log collection, content filtering, and other security-related systems to perform triage and investigation and incident response Provide support for security incidents coordination, by using different communication means. Ensure the SOC team documentation is up to date, including investigation Playbooks and Standard Operating Procedures as well incidents have current notes related to investigation steps which were performed. Categorization and prioritization of security incidents Looking for the correlation between various security events The Security Operations Center is responsible for providing 24/7, 365 monitoring, detection, and response capabilities for Comerica. This includes event, cloud security, and DLP monitoring, as well as a role in the incident response process. The Tier 1 SOC analyst primarily serves as the initial triage and investigation point for the SOC and would escalate incidents on an as needed basis. The Tier 1 Security Operation Center (SOC) Analyst is responsible for proactively monitoring and performing initial triage / investigation of security incidents and alerts to identify any malicious activity. Besides the initial triage and investigation, Tier 1 Analysts are expected to escalate security incidents according to defined escalation policies to Tier 2, Tier 3, and SOC leadership for further investigation / response. Duties/Responsibilities: SOC Analysis Monitor security incidents for, endpoints, network, and cloud domains, being generated by the SIEM tool and ticketing system. Initial triage and investigation of incidents assigned through the ticketing system, following established playbooks for specific incident types. Respond, mitigate, and eradicate security threats, with guidance from Tier 2, Tier 3 analysts, as well as SOC leadership. Documentation and Support Provide consistent and quality documentation of actions taken to triage / investigate incidents. Assist senior staff in development of documentation / knowledge management articles for the SOC. Handle sensitive information in accordance with the Corporate Information Protection Policy. Collaborate with other Engineering and Operations teams to troubleshoot, respond, and improve detection capabilities. Skills: Solid understanding of Cybersecurity concepts and frameworks. Proven, excellent analytical skills. Working knowledge in the use of tools such as SIEM / IT Ticketing technologies, EDR, Email Gateways, Malware Analysis Sandbox. Understanding of networking (TCP/IP networks and protocols) concepts. Understanding of phishing and malware techniques Strong written and oral communication, documentation, and organizational skills Keywords: access management information technology green card Michigan SOC ANALYST :: Local to Michigan :: Only USC & GC (Minimum 8 Years Consultant) avinash@zealhire.com https://jobs.nvoids.com/job_details.jsp?id=1999036 |
avinash@zealhire.com View All |
08:02 PM 10-Dec-24 |