Monitor and respond to security alarms\alerts\incidents in Security tools such as SIEM, EDR and NDR
Provide strategic analysis, investigating, reporting, remediation, coordinating and tracking of security-related activities to Senior Security Analysts, SOC Engineering, and/or customers.
Escalate complex investigation and work with higher-level analysts or incident response teams.
Document security alert analysis, steps taken to investigate, and resolution steps performed.
Deliver services according to service targets (SLA’s) and quality standards
Contribute to SOC continuous improvement program
Communicate effectively with customers, teammates, and management.
Skills and attributes for success:
Good knowledge of utilizing security tools such as: Splunk, Sentinel, Crowdstrike, Microsoft Defender, ServiceNow, etc.
Good knowledge in Security Monitoring and Cyber Incident Response.
Knowledge on Cyber Kill Chain Process and MITRE Attack
Understanding common threat vectors (malware, email, and website analysis at a basic level).
Knowledge of general security concepts and methods
To qualify for the role, you must have
Bachelor's degree in Computer Science, Information Technology, or a related field with minimum GPA of 3.20.
Experience with Windows, Linux, UNIX, any other major operating systems.
Demonstrate technical and security practices to problem solving.
Demonstrate in-depth technical capabilities and professional knowledge.
Willingness to work in a 24/7 operations center (shift work required).