Current Statistics

1,519,650 Total Jobs
225,521 Jobs Today
16,612 Cities
222,697 Job Seekers
146,732 Resumes

 

SOC Analyst II - Remote EST - $45-55/hr - W2 Only - Raleigh North Carolina

Company: Apex Systems
Location: Raleigh, North Carolina
Posted On: 05/17/2024

SOC Analyst II - Remote EST - $45-55/hr - W2 Only*Candidate must be able to work on client's W2 without sponsorship, vendor or employer*As technology continues to advance so does the threat landscape. Attackers are now using more sophisticated tactics to evade security controls. As a result, our team must also continue to advance its capabilities in threat detection and monitoring systems.The SOC Tier II Analyst is responsible for monitoring, analysis, response, and escalation of security incidents and events. The Security Operations Center is the first line of detection and defense which actively monitors the SIEM (Security Information & Event Management), reviews log and event data, and works tickets associated with said data. Providing research using internal and open source tools, resolving and escalating incidents using established policies and procedures.How You Will Make a Difference:

  • Monitoring and analysis of logs, alerts, and external data sources to determine any security and/or operational impact to the organization.
  • Performs research on security events and threat intelligence data using internal and open source tool. Performing proactive threat research and validation for security event data generated from monitoring tools and/or manual analysis.
  • Creation of Reference Sets within the SIEM tool to assist Tier 1 SOC Analysts with threat research.
  • Monitoring IPS (Intrusion Prevention System) events and performing analysis on the data providing recommended actions or escalating to incident analysts for further review.
  • Trains all new SOC Tier I Analysts in the usage or all security tools and the execution of all SOC procedures.
  • Acts as an escalation point for the Tier I SOC Analysts. Resolves or escalates cyber security incidents and events as part of the established policies and procedures.
  • Assists with the containment of threats and remediation of the environment during or following an incident.
  • Collaborates with technical teams to identify, resolve, and mitigate security events as part of the Incident Response Plan.
  • Evaluates unwarranted changes within the environment as part of monitoring rules within the SIEM tool.
  • Creates and executes SOC compliance reports as necessary for risk and compliance teams.
  • Monitors SIEM environment for Global organization, providing resolution to events and incidents triggered within the SIEM tool as part of the day to day operations.
  • Ensures that critical infrastructure is reporting into the SIEM and reports any systems that are not reporting to the appropriate team/s.
  • Performs documentation of event analysis and records this data within our Incident Tracking tool. Ensuring all relevant data is captured within each incident.
  • Assists with the triage of service requests from internal teams within the organization through our incident ticketing system.
  • Enhances detections, alerts, and other cyber event correlation rules within the SIEM to reduce false positives.
  • Approves various block requests originated by the Tier I SOC Analysts.
  • Manages the SOC documentation repository by providing oversight of the annual SOC Documentation review process. Provides recommendations for procedural updates and improvements. Reviews recommendations proposed by Tier I SOC Analysts.
  • Represent the Security Operations team in various SOC, Incident Response, and Cyber Security projects.Years of Related Professional Experience: 3+ yearsEducational/ Position Requirements: Position Requirements:
    • Experience executing security incident handling processes and procedures.
    • Working knowledge of Networking fundamentals including but not limited to; The OSI Model, TCP/IP, DNS (Domain Name System), HTTP, SMTP), System Administration and/or Architecture.
    • Proficient understanding of various Operating Systems and their architectures: Windows, Unix/Linux and OSx.
    • Previous experience operating and tuning SIEM tools, IBM QRadar experience preferred.
    • Effective communication skills with the ability to work in a highly collaborative environment across many different disciplines.
    • Strong relationship skills and collaborative style to enable success across multiple business partners with a focus on building partnerships.
    • Excellent analytical and problem-solving skills.
    • Scripting capabilities in bash, python, ruby considered a plus.Educational Requirements:
      • A bachelor's degree in computer science, information systems or other related field (preferred); or equivalent work experience.
      • Professional security management certifications such as; Global Information Assurance Certification (GIAC) certifications such as GCIA, GCIH, Certified Information Systems Security Professional (CISSP) or other similar credentials are a plus. More...

        Send this job to a Friend     


        Register an account with us and set up job agents! We'll email you immediately when jobs like this are posted on our site.


Your Account
Email:
Password:
Register a New Account

Can't find what you're looking for? Try searching here:
Google
 
Web www.localjobboard.com

Copyright 2024 LocalJobBoard.com. All Rights Reserved.

RSS Job Feeds

SOC Analyst II - Remote EST - $45-55/hr - W2 Only: Raleigh, North Carolina job search information from LocalJobBoard.com

Recruiter expertise by Recruiter Media Corporation

Job Offers Search Engine

Raleigh North Carolina job: SOC Analyst II - Remote EST - $45-55/hr - W2 Only, Raleigh North Carolina job search