SOC Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response. Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems. They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues. This individual is user focused and works to resolve client needs in a timely manner. These needs may involve resolving hardware/software failures, investigating, and responding to security threats, and making change request to the security policy of company devices.
The SOC Analyst is expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipment at client locations. The Analyst is expected to be familiar with a wide range of security tools and understand basic security fundamentals. The Analyst will perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis.
Roles & Responsibilities:
Monitor and analyze network traffic and alerts
Investigate intrusion attempts and perform in-depth analysis of exploits
Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident
Conduct proactive threat research
Review security events that are populated in a Security Information and Event Management (SIEM) system
Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility
Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest
Independently follow procedures to contain, analyze, and eradicate malicious activity
Document all activities during an incident and provide leadership with status updates during the life cycle of the incident
Incident management, response, and reporting
Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client
Track trends, statistics, and key figures for each assigned client
Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions
Reporting
Incident reports
Security status reports
Client-facing security meetings
Position Requirements:
Incident handling/response experience
Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles
Understanding of and a strong desire to learn common security technologies (IDS, Firewall, SIEM, etc.)
The ability to think creatively to find elegant solutions to complex problems
Excellent verbal and written communication skills
The desire to work both independently and collaboratively with a larger team
A willingness to be challenged along with a strong appetite for learning
8-10 years of experience in Information Security, Incident Response, etc. (or related field)
Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.)
Knowledge of common security analysis tools & techniques
Understanding of common security threats, attack vectors, vulnerabilities and exploits
Knowledge of regular expressions
Education:
Bachelors Degree in Computer Science, Information Security or related/equivalent educational or work experience
One or more of the following certifications: CISSP, GCIA, Security+, CEH, ACSE
Job Classification
Industry: IT Services & ConsultingFunctional Area / Department: IT & Information SecurityRole Category: IT SecurityRole: Security Engineer / AnalystEmployement Type: Full time