Skip to main content

This job has expired

Security Operations Center Analyst

Employer
Meridian Technologies, Inc.
Location
Crownsville, MD
Closing date
Apr 23, 2021
The SOC Analyst is a member of the Security Operations Center Team responsible for monitoring and detection of threats and cybersecurity attacks. The SOC Analyst works independently at times, as well as with other members of the SOC Team, to analyze system and security events, threat and vulnerability advisories, and cyber threat intelligence to identify malicious activity and potential attacks to alert clients to prevent or respond to incidents. Daily work includes monitoring network and system security events, conducting threat hunting through event data and activity logs, developing alarms for suspicious or malicious activity, escalating alerts to clients and preparing reports to summarize detected activities. The SOC Analyst executes and helps to create operational processes for consistent monitoring of client environments and should be familiar with varieties of security tools and technologies. The SOC Analyst additionally works to support the Incident Response Team by conducting monitoring and analysis during the course of incident management engagements. Responsibilities include Monitor security events and escalate verified alerts according to procedures to activate incident response processes. Conduct analysis of network traffic and computer system discovery applications. Assist in preparing client deliverables including reports, briefing presentations and recommendations to communicate security information, event summaries, vulnerabilities and threats to clients on a routine and periodic basis, helping to distill technical concepts into valuable and informative information. Contribute to the development of effective, efficient and repeatable processes to improve the operations of the SOC and value to clients. Perform threat hunting activities in client networks through proactive analysis of log, network and system data to identify undetected threats. Provide sound technical recommendations that enable remediation of security issues. Partner with security engineering to develop and refine SIEM correlation rules. Utilize advanced threat models, SIEM use cases, and incident response playbooks specific to customer network requirements. Required Skills and Qualifications Capable of working independently, establishing priorities and managing task completion within deadlines that are responsive to client needs within a team of SOC analysts working together to support our clients Able to communicate effectively through writing, speaking, and presenting to client technical representatives. Team player capable of productively contributing to the client mission by supporting fellow teammates in a dynamic growing and changing environment. Knowledgeable in network traffic analysis, threat detection, and advanced threat tactics, techniques and procedures (TTPs). Knowledgeable of network and security architecture principles, firewall and IDSIPS fundamentals, endpoint security systems and other security protectivedetective systems. Experience in cybersecurity event analysis, intrusion detection, and security operations. Desired Skills and Qualifications Possess an industry certification like CISSP, GCIH, GMON, GCIA, OSCP, CEH, CompTIA Security+ or other recognized credential(s). Computer Science or related 4-year degree. Experience creating detailed queries and scripts, such as regular expressions, for log, event and correlation analysis. Experience scripting in Python. Experience using Splunk.

Get job alerts

Create a job alert and receive personalized job recommendations straight to your inbox.

Create alert