SOC Analyst Co-Op

Deep SeasSan Diego, CA
Remote

About The Position

A SOC intern assists the Security Operations Center team by monitoring security alerts and events in real-time, analyzing potential threats, investigating incidents, and learning to respond to cybersecurity issues using various security tools, all while gaining practical experience in the field of cybersecurity under the guidance of experienced analysts; key responsibilities include threat monitoring, incident triage, log analysis, and reporting on potential security breaches. DeepSeas Interns will walk away with: Real-world experience in a Security Operations Center environment How to identify and analyze potential security threats Incident response methodologies and best practices The use of various security tools and technologies Cybersecurity industry trends and emerging threats

Requirements

  • Basic understanding of cybersecurity concepts like network protocols, firewalls, intrusion detection, and malware
  • Familiarity with log analysis and security event management tools
  • Strong analytical and problem-solving skills
  • Ability to work under pressure and quickly respond to incidents
  • Attention to detail and good communication skills

Nice To Haves

  • Programming or scripting knowledge is a plus

Responsibilities

  • Share in-depth knowledge and intelligence gained from cyber security events with stakeholders.
  • Protect against and prevent potential cyber security threats and vulnerabilities.
  • Monitor and analyze network traffic to identify potential security threats and vulnerabilities.
  • Monitor and analyze Security Information and Event Management (SIEM) alerts to identify security issues for remediation and investigate events and incidents.
  • Provide response, technical assistance and expertise for significant cyber incidents, investigations, and related operational events.
  • Contribute to security policies, procedures, and documentation.
  • Analyze network events to determine impact.
  • Assist in developing and maintaining analytical procedures to meet changing requirements.
  • Coordinate during all cyber incidents.
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
  • Determine tactics, techniques, and procedures for intrusion sets.
  • Work with stakeholders to resolve computer security incidents and vulnerability compliance.
  • Collaborate with cross-functional teams to ensure compliance with security standards and best practices.
  • Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
  • Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support incident response.
  • Incident Detection and Monitoring
  • Incident Analysis and Investigation
  • Incident Response and Mitigation
  • Threat Intelligence and Vulnerability Management
  • Reporting and Documentation
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service