SOC Analyst
Job description
SOC Analyst Location: Remote (EST) Schedule: Saturday, Sunday, and Monday (Weekend) Shift: 8:00AM - 8:00PM EST (3 consecutive 12hour shifts) Roles and Responsibilities:
- Perform security event triage and analysis with knowledge in current security threats and techniques.
- Conduct limited incident response and containment.
- Analyze all relevant data sources for attack indicators and potential network and host compromises.
- Respond to different attack vectors such as data exfiltration, DDoS, malware, insider risk, and phishing.
Qualifications:
- Advanced knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files).
- Advanced ability to analyze all relevant data sources for attack indicators and potential network and host compromises.
- Advanced knowledge of current security threats, techniques, and landscape, and a dedicated approach to research current information security landscape.
- Advanced understanding of IT Infrastructure designs, technologies, products, and services. This should include knowledge of networking protocols, firewall functionality, host and network intrusion detection systems, operating systems, databases, encryption, load balancing, and other technologies.
- You will hold one or more relevant security certifications/degrees and/or commensurate experience.
- Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means, evaluate information for reliability, validity, and relevance, and function effectively in a dynamic, fast-paced environment.
- In addition, you'll function in a collaborative environment, seeking continuous consultation with other analysts and experts-both internal and external to the organization-to leverage analytical and technical expertise, think critically and think like threat actors.
- Ability to develop productive working relationships with a broad range of business and operational area professionals.
Requirements:
- Requires a BA/BS degree or equivalent experience, and a minimum of three years' work experience supporting event triage and investigation in a Cyber Security SOC.
- An in-depth understanding of information security tools, technologies and security risks and vulnerabilities.
- Advanced SIEM/SOAR skills, including analyzing events from multiple monitoring and logging sources.
- Advanced knowledge of common adversary tactics, techniques and procedures and advanced knowledge of cyber threats and vulnerabilities.
- Preferred experience with cybersecurity tools such as Splunk and NTP; additional tools may include VMRay and VirusTotal.
Dexian stands at the forefront of Talent + Technology solutions with a presence spanning more than 70 locations worldwide and a team exceeding 10,000 professionals. As one of the largest technology and professional staffing companies and one of the largest minority-owned staffing companies in the United States, Dexian combines over 30 years of industry expertise with cutting-edge technologies to deliver comprehensive global services and support. Dexian connects the right talent and the right technology with the right organizations to deliver trajectory-changing results that help everyone achieve their ambitions and goals.To learn more, please visit https://dexian.com/. Dexian is an Equal Opportunity Employer that recruits and hires qualified candidates without regard to race, religion, sex, sexual orientation, gender identity, age, national origin, ancestry, citizenship, disability, or veteran status.
|