What you’ll be doing...
The SOC analyst is responsible for the delivery of high visibility security event analytics and consultative services to our Managed Security Services customer. The SOC analyst works primarily within our Security Information and Event Management platform to identify anomalies, malware, exploit attempts and other attacks on our customer’s network infrastructure and data. The SOC analyst’s job is to protect our customer’s information by watching over the devices which provide the confidentiality, integrity and availability of our customer’s critical information.
The SOC analyst delivers pertinent, timely and actionable security incidents to our customer. The analyst works with the Tier 3 team and the ArcSight security content developers providing feedback from the SOC back into the correlation policies. Information fed back includes threats seen and what needs to be seen across the customer infrastructure. This analyst is a skilled security professional who possesses experience in identifying, documenting, mitigating and consulting on today’s security threats landscape.
What we’re looking for...
You’ll Need to Have:
1+ yearof experience in a network security incident response position
The ability to work across 1st, 2nd, and 3rd shifts which rotate every four months and consist of 4 ten hour days across 7 days a week
Experience identifying, documenting, mitigating, and consulting on enterprise security threats
Experience in Linux, ArcSight, RSA enVision, or a proprietary SIEM
Even Better if you have:
Bachelor’s Degree or higher is preferred
ITIL Foundations training / certification
Security Certifications CEH, GCIA
Proactive in following up on customer issues
Ability to excel in high pressure environments