SOC Analyst

SOC Analyst

Posted 7 days ago by 1761113538

Negotiable
Outside
Remote
USA

Summary: The SOC Analyst role involves reviewing data to identify anomalies that necessitate further investigation, working three 12-hour shifts weekly. The position is remote, with the specific day or night shift yet to be determined. The analyst will collaborate with another resource from the client during their shift to ensure effective coverage.

Key Responsibilities:

  • Review data and identify anomalies for further investigation.
  • Work three 12-hour shifts a week on consecutive days.
  • Perform security event triage and analysis.
  • Respond to various attack vectors including data exfiltration, DDoS, malware, insider risk, and phishing.
  • Analyze large data sets and unstructured data to identify trends and anomalies.
  • Utilize SIEM to analyze security events from multiple sources.
  • Maintain knowledge of current security threats and techniques.

Key Skills:

  • Bachelor's degree in Computer Science or related discipline (preferred).
  • 0-2 years of experience or 6-8 years with a high school diploma.
  • Experience in security aspects of multiple platforms and operating systems.
  • Ability to analyze security events and identify suspicious activity.
  • Knowledge of TCP/IP protocol and network/packet analysis.
  • Familiarity with IT infrastructure designs and technologies.
  • Strong desire to research current information security landscape.

Salary (Rate): undetermined

City: undetermined

Country: USA

Working Arrangements: remote

IR35 Status: outside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Title: SOC Analyst

Location: 100% Remote

Description: This candidate will review data and help identify anomalies that require further investigation. The candidate will work (3) 12-hour shifts a week on consecutive days (though days may shift to ensure team coverage from time to time). Day or Night shift has yet to be determined. This resource will generally be on duty with one other resource from the client during their shift.

Typical Duties:

  • BS 0-2 Years or HS 6-8.
  • Bachelor's degree in Computer Science or a related discipline (preferred) and experience in security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination of education and work experience.
  • Security platform and technology capabilities; SIEM utilization skills with the ability to analyze security events from multiple monitoring and logging sources to identify and/or confirm suspicious activity.
  • Ability to analyze large data sets and unstructured data to identify trends and anomalies indicative of malicious activity.
  • Knowledge of, and experience with, TCP/IP protocol and network/packet analysis.
  • Knowledge of current security threats, techniques, and landscape, and a dedicated desire to research current information security landscape.
  • Perform security event triage and analysis with knowledge in current security threats and techniques.
  • Respond to different attack vectors such as data exfiltration, DDoS, malware, insider risk, and phishing.

Experience with IT Infrastructure designs, technologies, products, and services. This should include knowledge of networking protocols, firewall functionality, host and network intrusion detection systems, operating systems, databases, encryption, load balancing, and other technologies