SOC Analyst L2

SOC Analyst L2

Posted 1 day ago by 1763547258

Negotiable
Outside
Remote
USA

Summary: The SOC Analyst L2 role is an individual contributor position focused on identifying adversary activities within the network during the first shift. The candidate will utilize skills in log and network traffic analysis, along with the MITRE attack framework, to proactively discover threats. Collaboration with global IT security teams and mentoring junior staff are key aspects of the role. The position is remote and requires a strong understanding of security operations and incident response.

Key Responsibilities:

  • Part of the global IT security team working closely with the US SOCs teams.
  • Performs a combination of duties in accordance with departmental guidelines.
  • Conduct real-time and historical analysis using the full security suite owned by Client, including Endpoint Protection, SIEM, Firewall, Endpoint Detection & Response, Intrusion Detection Systems, Email Gateway, Web Content Filtering, Network Detection & Response, & Identity Management technology.
  • Conduct incident response triage analysis on suspected hosts to determine potential ongoing attacks and its scope.
  • Conduct an analysis review of junior staff for quality control; mentor junior staff to encourage career growth and development.
  • Stay on top of latest attacker tactics, techniques, and procedures to discover sophisticated threats in the network.
  • Collaborate with SOC, Intelligence, Incident Response, and Enterprise Security Teams for incident investigations and hunt missions when possible.
  • Identify visibility gaps in the network and recommend solutions.
  • Develop, maintain, and update playbooks, processes, and detection capabilities based on real-time feedback from investigations.
  • Coordinate escalation for advance forensics, malware reverse-engineering, and additional host review tasks to third party vendors.
  • Articulate security incident details to business stakeholders and non-technical individuals.
  • May perform additional duties as assigned.

Key Skills:

  • Familiarity with SOC operations, scheduling, and tools including SIEM, SOAR, and DFIR products.
  • Knowledge of the incident response lifecycle and cyber security leading practices.
  • Solid understanding of security policy construction and publication.
  • In-depth knowledge of regulations (i.e., SOX, privacy, etc.) and internal controls as they apply to IT.
  • Ability to influence change in corporate understanding and adoption of information security concepts.
  • Proven solid analytical and problem solving skills.
  • Excellent communications and interpersonal skills and the ability to work effectively with peers, IT management and staff, and internal/external business partners/clients.
  • Ability to manage various technical projects to completion.
  • Advanced computer skills including Microsoft Office suite and other business related software systems. Other technologies will apply dependent on business area supported.
  • Preferred insurance industry knowledge.

Salary (Rate): undetermined

City: undetermined

Country: USA

Working Arrangements: remote

IR35 Status: outside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Hours: SOC L2 1st shift position (M-F, 9 am-5:45 pm CT)

Location: Remote

An individual contributor for the First shift focused on proactively finding adversary activities in the network with the goal of discovery before they complete their mission. The ideal candidate would have skills and experience in log analysis, network traffic analysis, and the MITRE attack framework.

  • Part of the global IT security team working closely with the US SOCs teams.
  • Performs a combination of duties in accordance with departmental guidelines.
  • Conduct real-time and historical analysis using the full security suite owned by Client, including Endpoint Protection, SIEM, Firewall, Endpoint Detection & Response, Intrusion Detection Systems, Email Gateway, Web Content Filtering, Network Detection & Response, & Identity Management technology.
  • Conduct incident response triage analysis on suspected hosts to determine potential ongoing attacks and its scope.
  • Conduct an analysis review of junior staff for quality control; mentor junior staff to encourage career growth and development.
  • Stay on top of latest attacker tactics, techniques, and procedures to discover sophisticated threats in the network.
  • Collaborate with SOC, Intelligence, Incident Response, and Enterprise Security Teams for incident investigations and hunt missions when possible.
  • Identify visibility gaps in the network and recommend solutions.
  • Develop, maintain, and update playbooks, processes, and detection capabilities based on real-time feedback from investigations.
  • Coordinate escalation for advance forensics, malware reverse-engineering, and additional host review tasks to third party vendors.
  • Articulate security incident details to business stakeholders and non-technical individuals.
  • May perform additional duties as assigned
  • Familiarity with SOC operations, scheduling, and tools including SIEM, SOAR, and DFIR products.
  • Knowledge of the incident response lifecycle and cyber security leading practices.
  • Solid understanding of security policy construction and publication.
  • In-depth knowledge of regulations (i.e., SOX, privacy, etc.) and internal controls as they apply to IT.
  • Ability to influence change in corporate understanding and adoption of information security concepts.
  • Proven solid analytical and problem solving skills.
  • Excellent communications and interpersonal skills and the ability to work effectively with peers, IT management and staff, and internal/external business partners/clients.
  • Ability to manage various technical projects to completion.
  • Advanced computer skills including Microsoft Office suite and other business related software systems. Other technologies will apply dependent on business area supported.
  • Preferred insurance industry knowledge.