Digicert-posted about 1 year ago
Full-time • Entry Level
Herndon, VA
Professional, Scientific, and Technical Services

The Security Operations Analyst at DigiCert plays a crucial role in enhancing the company's security operations by identifying potential risks and threats through real-time log analysis. This position involves maintaining and improving DigiCert's security posture by analyzing exploits and vulnerabilities, supporting the Service Desk, and participating in an on-call rotation. The analyst will work collaboratively within a team while also being self-sufficient in solo tasks, and is expected to stay updated on emerging threats and security practices.

  • Provide analysis of security threats and problems.
  • Management and evaluation of security alerts and detections.
  • Work through tickets and resolve them per defined SLAs.
  • Participate in Security Incident Response and analysis of incidents.
  • Assist in the configuration, management, and maintenance of various security-related software and systems.
  • Effectively work within a team and be self-sufficient when assigned solo work.
  • Stay current on emerging threats, vulnerabilities, and audit framework updates.
  • Evaluate new tools to improve efficiencies in operational processes.
  • Actively participate in ongoing training and knowledge transfer with team members.
  • Provide metrics and statistics to management.
  • Critically assess current practices and provide feedback on improvement opportunities.
  • Understand policies and standards and convey those requirements to end users.
  • Set clear expectations and provide timely follow-up as appropriate.
  • Administration, monitoring, and issue resolution for all IT users, devices, and services.
  • Provide audit support for Compliance.
  • 1+ years of experience in Information Technology or related technical discipline.
  • General knowledge of Information Security design concepts and principles.
  • Strong written and verbal communication skills.
  • Customer Service background with good interpersonal and organizational skills.
  • Ability to perform in-depth log analysis.
  • Willingness and ability to obtain Security+ certification if not already completed.
  • Proficiency with Windows, Mac, and Linux, including administrative activities and threat analysis.
  • Experience installing and maintaining a security agent on operating systems, preferably CrowdStrike Falcon Sensor.
  • Experience performing analysis with SIEM tool, preferably Azure Sentinel.
  • Experience with Incident Triage through Event Correlation and Analysis.
  • Proficiency with a structured query language, preferably Kusto Query Language (KQL).
  • Experience using standard operating procedures (SOP) and following directions.
  • Experience triaging and remediating security incidents related to identity, devices, and data.
  • Experience using MITRE ATT&CK Framework to pursue attack path scenarios.
  • Knowledge of penetration testing practices and principles.
  • Willing and able to rotate an on-call schedule.
  • Generous time off policies
  • Top shelf benefits
  • Education, wellness and lifestyle support
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service