Entry Level SOC Analyst
Entry Level SOC Analyst tasks will be end-to-end including the network, underlying servers and infrastructure (physical and virtual) as well as the application. Candidates will learn to perform SOC triage and response analysis uncovering attack vectors involving a variety of malware, data exposure, as well as phishing and social engineering methods.
• The successful candidate must have a strong understanding of SIEM and endpoint security tools used to source alerts.
• Ability to evaluate events (through a triage process) and identify appropriate prioritization for response
• Ability to use and follow Standard Operating Procedures (SOPs)
• Triage Security Alerts; from multiple sources but not limited to: Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources
• Triage and resolution of SOC tasks; including but not limited to: vulnerability
announcements, phishing email review, Tier 1 IR support, SIEM/Security Tools -
alert analysis
• Understanding of security incident response processes
Responsibilities:
• Supporting 24x7x365 SOC operations including but not limited to: Alert and
notification activities- analysis / triage / response, Review and action on Threat
Intel for IOCs and other operationally impactful information, initial review and
triage of reported Incidents
• Review and report on anomalous patterns (Hunting) across all security tools / SIEM
• Logging security incidents in the IT ticketing system
• Supporting ad-hoc data and investigation requests
• Participating in the remediation of incidents and responses that are generated from live threats against the enterprise
• Develop an understanding of customer and SOC operations requirements and
policies
• Supporting incident response / handling (Detection, Analysis, Triage)
• Supporting and developing reports during and after SOC monitoring or Incidents, which include all actions taken to properly mitigate, recover and return to normal operations
• IDS monitoring and analysis, analyze network traffic, log analysis, prioritize and
differentiate between potential intrusion attempts and false alarms
• General cyber-attack stages, profiling techniques and techniques for detecting host and network-based intrusions
• Composing security alert notifications
Job Types: Contract, Part-time
Pay: Up to $20.00 per hour
Compensation package:
• 1099 contract
• Hourly pay
Schedule:
Flexible schedule
• 4-8 hour shift
• Evening shift
• Holidays
• Night shift
• On call
• Weekend availability
Experience:
• Demonstrate experience of the underlying logs generated by operating systems
(Linux/Windows), Network Security Devices, and other enterprise tools
• IDS/IPS: 1 year experience/exposure (Preferred)
• Cybersecurity: 1 year experience/exposure (Preferred)
• Information security: years (Preferred)
Work Location:
Remote