Negotiable
Outside
Remote
USA
Summary: The Sr. SOC Analyst role involves working in a 24x7x365 Security Operations Center (SOC) environment, focusing on incident detection, response, and remediation. The position requires extensive experience in security monitoring and analysis, along with a strong understanding of various security technologies and frameworks. The analyst will also be responsible for supporting incident investigations and managing security documentation. This role is remote and requires a proactive approach to threat hunting and vulnerability analysis.
Key Responsibilities:
- Perform alternating shift work on a 24x7x365 Security Monitoring, Analysis and Response.
- Support incident investigations, response, and reporting.
- Security Reporting.
- Vulnerability Analysis.
- SOC ticket queue management.
- Document actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed.
- Security documentation review and updates.
- Proactive threat hunting.
Key Skills:
- Bachelors + minimum 7 years of relevant work experience.
- 5+ years of experience working in a 24x7x365 SOC environment.
- 5+ years of experience in the areas of incident detection and response, remediation malware analysis, or computer forensics.
- One of the following certifications: Security +, CEH, CFR, CCNA Cyber Ops, CCNA-Security, CySA+, GCIA, GCIH, GICSP, Cloud+, SCYBER, PenTest+.
- Analyzing system and network logs for security events, anomalies, and configuration issues.
- Experience working with SIEM technology to monitor and manage security events.
- Background in incident response, system/network operations and threat intelligence.
- Experience utilizing enterprise security technologies such as SIEM/SOAR, NGAV/EDR, Vulnerability scanners, and Threat Intelligence Platforms.
- Understanding of enterprise environments, specifically cloud-based and hybrid cloud environments.
- Understanding of common cyber intrusion frameworks such as Cyber Kill Chain, Diamond Model, MITRE ATT&CK with the ability to train others.
- Hands-on troubleshooting, analysis, and technical expertise to resolve incidents and/or service requests.
- Understanding of possible attack activities such as network reconnaissance probing/scanning, DDOS, malicious code activity, etc.
- Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell.
- Experience in two or more of these specialized areas: Insider Threat, Digital media forensic, Monitoring and detection, Incident Response.
- Understanding and experience with Federal Security Standards such as NIST and DoD.
- Understanding and experience with FedRAMP Cloud Security Requirements.
Salary (Rate): undetermined
City: undetermined
Country: USA
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
Sr. SOC Analyst
Client: TriWest
POP: 12+ months
Location: Remote
REQUIRED SKILLS
- Bachelors + minimum 7 years of relevant work experience.
- 5+ years of experience working in a 24x7x365 SOC environment.
- 5+ years of experience in the areas of incident detection and response, remediation malware analysis, or computer forensics.
- One of the following certifications: Security +, CEH, CFR, CCNA Cyber Ops , CCNA-Security, CySA+ **, GCIA, GCIH, GICSP, Cloud+, SCYBER, PenTest+.
- Analyzing system and network logs for security events, anomalies, and configuration issues.
- Experience working with SIEM technology to monitor and manage security events.
- Background in incident response, system/network operations and threat intelligence.
- Experience utilizing enterprise security technologies such as SIEM/SOAR, NGAV/EDR, Vulnerability scanners, and Threat Intelligence Platforms.
- Understanding of enterprise environments, specifically cloud-based and hybrid cloud environments.
- Understanding of common cyber intrusion frameworks such as Cyber Kill Chain, Diamond Model, MITRE ATT&CK with the ability to train others.
- Hands-on troubleshooting, analysis, and technical expertise to resolve incidents and/or service requests.
- Understanding of possible attack activities such as network reconnaissance probing/ scanning, DDOS, malicious code activity, etc.
- Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell.
- Experience in two or more of these specialized areas: Insider Threat, Digital media forensic, Monitoring and detection, Incident Response.
- Understanding and experience with Federal Security Standards such as NIST and DoD.
- Understanding and experience with FedRAMP Cloud Security Requirements.
TASKS
- Perform alternating shift work on a 24x7x365 Security Monitoring, Analysis and Response.
- Support incident investigations, response, and reporting.
- Security Reporting.
- Vulnerability Analysis.
- SOC ticket queue management.
- Document actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed.
- Security documentation review and updates.
- Proactive threat hunting.