We are seeking a skilled and proactive SOC Analyst with 3-4 years of experience. In this role, you will monitor, analyze, and respond to security incidents while leveraging your expertise in system administration and networking fundamentals.
Key Responsibilities
-
Threat Monitoring and Analysis:
- Continuously monitor security alerts, logs, and events using SIEM tools like Microsoft Sentinel.
- Perform real-time analysis and triage of security incidents to assess impact and risk.
- Identify and escalate threats requiring advanced investigation or remediation.
-
Incident Response:
- Lead the initial response to security incidents, including containment, eradication, and recovery.
- Document findings, actions, and outcomes for incident reports.
- Collaborate with IT and Security teams to implement long-term fixes and preventive measures.
-
Vulnerability Management:
- Support vulnerability scanning and remediation efforts across endpoints, servers, and networks.
- Recommend security patches and updates to maintain a secure IT environment.
-
System Administration & Networking:
- Utilize knowledge of system administration to analyze and secure Windows, Linux, and cloud-based environments.
- Leverage networking fundamentals to investigate traffic anomalies, unauthorized access, and lateral movement.
- Assist in system hardening, firewall configurations, and reviewing network architecture for vulnerabilities.
-
Tool Optimization and Maintenance:
- Manage and optimize security tools such as Microsoft Defender and SentinelOne.
- Maintain and fine-tune SIEM rules and alert thresholds to reduce noise and increase threat detection accuracy.
- Assist in deploying and configuring new security technologies as required.
-
Reporting and Collaboration:
- Generate security metrics and reports to support audits and compliance requirements.
- Work closely with cross-functional teams to strengthen overall security posture.
- Provide mentorship and guidance to junior SOC Analysts as needed.
Qualifications
- Education: Bachelor’s degree in Computer Science, Information Security, or related field preferred (or equivalent experience).
- Experience:
- 3-4 years of experience in a SOC environment or a similar security-focused role.
- Hands-on experience with Microsoft Defender, SentinelOne, and Microsoft Suite (Azure AD, Office 365).
- Technical Knowledge:
- Proficiency in system administration (Windows/Linux/macOS environments).
- Strong understanding of networking fundamentals (TCP/IP, DNS, firewalls, VLANs).
- Familiarity with SIEM tools such as Microsoft Sentinel or Splunk.
- Experience with endpoint protection and EDR tools like SentinelOne.
- Certifications (Preferred):
- CompTIA Security+, CompTIA CySA+, Microsoft Certified: Security Operations Analyst, or similar.
#10566