Cybersecurity Operations Center Analyst

Land O'LakesArden Hills, MN
18hOnsite

About The Position

The Cybersecurity Operations Center Analyst serves as the frontline defense for the organization's information security, responsible for the continuous monitoring of the security toolstack to identify alerts and suspicious activity. Operating within the Cybersecurity Operations team, this role focuses on the triage and escalation of incidents based on severity, ensuring rigorous adherence to established runbooks and incident handling procedures. This position demands a detail-oriented professional who demonstrates ownership by documenting findings, maintaining accurate incident logs, and engaging in proactive threat hunting across multiple platforms. The Cybersecurity Analyst acts decisively to troubleshoot technical issues using multiple sources and contributes to the team’s collective goals by completing backlog user stories and participating in the after-hours on-call rotation.

Requirements

  • Attention to detail and analytical thinking
  • Ability to work under pressure and follow procedures
  • Basic understanding of networking and operating systems
  • Ability to troubleshoot technical issues using multiple sources

Nice To Haves

  • Minimum of 4 years combined education (associate or bachelor’s degree) or professional experience in computer science, engineering, information technology, or a related field, with focus on system administration, security operations, or incident response.
  • Knowledge of some of the following: Audit requirements (PCI, HIPPA, SOX, etc.) Blue Team/Defensive security concepts Red Team/Offensive security concepts MITRE ATT&CK and Malware TTPs (tactics, techniques and procedures) Current threat landscape (threat actors, APT, cyber-crime, etc.) Log parsing and analysis skill set Incident investigation and response skill set Threat Intelligence
  • SIEM tools (Splunk, Crowdstrike NG SIEM, ArcSight)
  • Basic TCP/IP networking concepts
  • Windows/Linux system administration fundamentals
  • Familiarity with host security fundamentals
  • Networking security fundamentals
  • Cloud computing security fundamentals
  • Working Towards certifications in the following areas: Incident Handler (GCIH) Intrusion Analyst (GCIA)

Responsibilities

  • Monitor SIEM dashboards for alerts and suspicious activity
  • Triage and escalate incidents based on severity
  • Document findings and maintain incident logs
  • Follow established runbooks for incident handling
  • Engage in threat hunting across multiple platforms
  • Complete simple backlog user stories
  • Participate in after-hours on-call rotation

Benefits

  • Benefits for most full-time roles include medical, dental, vision, PTO, life & disability insurance, education assistance, a 401k and a variety of well-being resources.
  • Most part-time employees are eligible for prorated PTO, holiday pay, employee development programs, prorated education assistance, and a 401(k).

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Entry Level

Education Level

Associate degree

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service