Security Operations Center Analyst
About the Company
Company Name: [Provide a brief introduction to the company, its mission, and culture.]
About the Role
A short paragraph summarizing the key role responsibilities.
Responsibilities
- Act as the escalation point for complex incidents and provide expert analysis and guidance.
- Proactively hunt for threats and vulnerabilities within the organization.
- Lead the investigation of advanced security incidents, including root cause analysis and remediation.
- Collaborate with stakeholders across IT, risk management, and executive teams to mitigate risks effectively.
- Ensure timely detection, triage, and response to security threats and events.
- Perform advanced-level threat analysis, correlating events from multiple sources.
- Lead incident response, containment, and recovery activities, including root cause analysis and remediation.
- Conduct detailed post-incident reviews and create root cause analysis reports.
- Develop and maintain SOC playbooks and standard operating procedures.
- Perform threat intelligence research and integrate findings into detection mechanisms.
- Conduct security tool fine-tuning, including SIEM and EDR platforms.
- Train and mentor junior SOC analysts (L1/L2) to enhance overall team capability.
- Collaborate with teams to evaluate and deploy advanced cybersecurity tools and techniques.
- Ensure adherence to compliance and regulatory requirements in SOC operations.
Qualifications
Education details
Required Skills
- Advanced understanding of threat landscapes, adversary tactics, and attack frameworks (e.g., MITRE ATT&CK).
- Proficiency in incident response, malware analysis, and digital forensics.
- Strong knowledge of security technologies, including firewalls, SIEM, EDR, IDS/IPS, and DLP solutions.
- Hands-on experience with scripting and automation (Python, PowerShell, etc.).
- Expertise in network traffic analysis and packet-level investigations.
- Excellent communication and report-writing skills.
- Ability to lead teams and make decisions under pressure during active incidents.
Preferred Skills
- Master’s degree in Cybersecurity or a related field.
- Certifications in advanced threat intelligence or forensic analysis (e.g., GCFA, GREM).
Pay range and compensation package
Pay range or salary or compensation
Equal Opportunity Statement
Include a statement on commitment to diversity and inclusivity.
About the Company
Company Name: [Provide a brief introduction to the company, its mission, and culture.]
About the Role
A short paragraph summarizing the key role responsibilities.
Responsibilities
- Act as the escalation point for complex incidents and provide expert analysis and guidance.
- Proactively hunt for threats and vulnerabilities within the organization.
- Lead the investigation of advanced security incidents, including root cause analysis and remediation.
- Collaborate with stakeholders across IT, risk management, and executive teams to mitigate risks effectively.
- Ensure timely detection, triage, and response to security threats and events.
- Perform advanced-level threat analysis, correlating events from multiple sources.
- Lead incident response, containment, and recovery activities, including root cause analysis and remediation.
- Conduct detailed post-incident reviews and create root cause analysis reports.
- Develop and maintain SOC playbooks and standard operating procedures.
- Perform threat intelligence research and integrate findings into detection mechanisms.
- Conduct security tool fine-tuning, including SIEM and EDR platforms.
- Train and mentor junior SOC analysts (L1/L2) to enhance overall team capability.
- Collaborate with teams to evaluate and deploy advanced cybersecurity tools and techniques.
- Ensure adherence to compliance and regulatory requirements in SOC operations.
Qualifications
Education details
Required Skills
- Advanced understanding of threat landscapes, adversary tactics, and attack frameworks (e.g., MITRE ATT&CK).
- Proficiency in incident response, malware analysis, and digital forensics.
- Strong knowledge of security technologies, including firewalls, SIEM, EDR, IDS/IPS, and DLP solutions.
- Hands-on experience with scripting and automation (Python, PowerShell, etc.).
- Expertise in network traffic analysis and packet-level investigations.
- Excellent communication and report-writing skills.
- Ability to lead teams and make decisions under pressure during active incidents.
Preferred Skills
- Master’s degree in Cybersecurity or a related field.
- Certifications in advanced threat intelligence or forensic analysis (e.g., GCFA, GREM).
Pay range and compensation package
Pay range or salary or compensation
Equal Opportunity Statement
Include a statement on commitment to diversity and inclusivity.