Epicareer Might not Working Properly
Learn More

Security Operations Center Analyst

Salary undisclosed

Checking job availability...

Original
Simplified

About the Company

Company Name: [Provide a brief introduction to the company, its mission, and culture.]

About the Role

A short paragraph summarizing the key role responsibilities.

Responsibilities

  • Act as the escalation point for complex incidents and provide expert analysis and guidance.
  • Proactively hunt for threats and vulnerabilities within the organization.
  • Lead the investigation of advanced security incidents, including root cause analysis and remediation.
  • Collaborate with stakeholders across IT, risk management, and executive teams to mitigate risks effectively.
  • Ensure timely detection, triage, and response to security threats and events.
  • Perform advanced-level threat analysis, correlating events from multiple sources.
  • Lead incident response, containment, and recovery activities, including root cause analysis and remediation.
  • Conduct detailed post-incident reviews and create root cause analysis reports.
  • Develop and maintain SOC playbooks and standard operating procedures.
  • Perform threat intelligence research and integrate findings into detection mechanisms.
  • Conduct security tool fine-tuning, including SIEM and EDR platforms.
  • Train and mentor junior SOC analysts (L1/L2) to enhance overall team capability.
  • Collaborate with teams to evaluate and deploy advanced cybersecurity tools and techniques.
  • Ensure adherence to compliance and regulatory requirements in SOC operations.

Qualifications

Education details

Required Skills

  • Advanced understanding of threat landscapes, adversary tactics, and attack frameworks (e.g., MITRE ATT&CK).
  • Proficiency in incident response, malware analysis, and digital forensics.
  • Strong knowledge of security technologies, including firewalls, SIEM, EDR, IDS/IPS, and DLP solutions.
  • Hands-on experience with scripting and automation (Python, PowerShell, etc.).
  • Expertise in network traffic analysis and packet-level investigations.
  • Excellent communication and report-writing skills.
  • Ability to lead teams and make decisions under pressure during active incidents.

Preferred Skills

  • Master’s degree in Cybersecurity or a related field.
  • Certifications in advanced threat intelligence or forensic analysis (e.g., GCFA, GREM).

Pay range and compensation package

Pay range or salary or compensation

Equal Opportunity Statement

Include a statement on commitment to diversity and inclusivity.

About the Company

Company Name: [Provide a brief introduction to the company, its mission, and culture.]

About the Role

A short paragraph summarizing the key role responsibilities.

Responsibilities

  • Act as the escalation point for complex incidents and provide expert analysis and guidance.
  • Proactively hunt for threats and vulnerabilities within the organization.
  • Lead the investigation of advanced security incidents, including root cause analysis and remediation.
  • Collaborate with stakeholders across IT, risk management, and executive teams to mitigate risks effectively.
  • Ensure timely detection, triage, and response to security threats and events.
  • Perform advanced-level threat analysis, correlating events from multiple sources.
  • Lead incident response, containment, and recovery activities, including root cause analysis and remediation.
  • Conduct detailed post-incident reviews and create root cause analysis reports.
  • Develop and maintain SOC playbooks and standard operating procedures.
  • Perform threat intelligence research and integrate findings into detection mechanisms.
  • Conduct security tool fine-tuning, including SIEM and EDR platforms.
  • Train and mentor junior SOC analysts (L1/L2) to enhance overall team capability.
  • Collaborate with teams to evaluate and deploy advanced cybersecurity tools and techniques.
  • Ensure adherence to compliance and regulatory requirements in SOC operations.

Qualifications

Education details

Required Skills

  • Advanced understanding of threat landscapes, adversary tactics, and attack frameworks (e.g., MITRE ATT&CK).
  • Proficiency in incident response, malware analysis, and digital forensics.
  • Strong knowledge of security technologies, including firewalls, SIEM, EDR, IDS/IPS, and DLP solutions.
  • Hands-on experience with scripting and automation (Python, PowerShell, etc.).
  • Expertise in network traffic analysis and packet-level investigations.
  • Excellent communication and report-writing skills.
  • Ability to lead teams and make decisions under pressure during active incidents.

Preferred Skills

  • Master’s degree in Cybersecurity or a related field.
  • Certifications in advanced threat intelligence or forensic analysis (e.g., GCFA, GREM).

Pay range and compensation package

Pay range or salary or compensation

Equal Opportunity Statement

Include a statement on commitment to diversity and inclusivity.