This is a remote position.
SUMMARY
As a Security Operations Analyst you will be responsible for monitoring detecting and responding to cybersecurity threats and incidents. You will work within the Security Operations Center (SOC) and collaborate with other team members to protect critical systems and data. Your role will include developing playbooks runbooks and incident response procedures as well as tuning security use cases and creating dashboards for monitoring and reporting.
JOB RESPONSIBILITIES
- Incident Monitoring & Detection (24x7)
- Incident Response
- Use Case Development & Tuning
- Playbook & Runbook Development
- Dashboards & Reporting
- Threat Intelligence Integration:
- Vulnerability Management
- Collaboration: Work with internal and external stakeholders for incident escalation resolution and communication.
QUALIFICATIONS
- CISCO (CSW XDR Secure Endpoint Secure Cloud Analytics)
- CrowdStrike
- ServiceNow
- Microsoft Defender
- Expel
- Tenable Vulnerability Manager
- Experience with SIEM platforms (e.g. Splunk IBM QRadar or similar)
- Knowledge of network security monitoring tools and intrusion detection systems (IDS/IPS)
- Experience in security analysis and malware analysis
- Familiarity with scripting for automation (Python PowerShell etc.)
- Understanding of network protocols logs and packet analysis
PREFERRED CERTIFICATION
- GCIH (GIAC Certified Incident Handler)
- eCIR (Certified Incident Responder)
- eCTHPv2 (Certified Threat Hunting Professional)
- OSDA (Offensive Security Defense Analyst)
JOB REQUIREMENTS
- Should be willing to accept a longterm workfromhome arrangement.
- Should be amenable to a permanent night shift schedule.
Requirement 1: SOC Analyst experience Requirement 2: CISCO (CSW, XDR, Secure Endpoint, Secure Cloud Analytics) Requirement 3: CrowdStrike Requirement 4: SIEM platforms (e.g., Splunk, IBM QRadar or similar) Requirement 5: Experience in security analysis and malware analysis