Epsilon, Inc. has joined AMERICAN SYSTEMS! As one organization, we offer expanded resources, streamlined operations, and increased opportunities for growth and development. Join us to be part of a dynamic, collaborative environment dedicated to innovation and customer success. Responsibilities An Average Day:As the SOC Analyst II, you will provide tier II cybersecurity support in a Security Operations Center “SOC” environment. Daily responsibilities of the SOC are ever changing, however, you can expect to regularly conduct vulnerability assessments, analyze cyber threats, monitor the email gateway and create reports on all confirmed or suspicious activities. You will work closely with the Tier I and other Tier II personnel to effectively and efficiently provide optimum service to our customers as well as assist with training SOC Analyst I team members when needed. Additionally, in this position you will: Use intrusion detection technologies to apply techniques for identifying host and network-based intrusions. Create, update, and resolve incident tickets that have been tasked to Tier II and appropriately document all alerts and incidents in the ticketing system. Review asset discovery and vulnerability assessment data. Lead incidents from alert to resolution: Leverage emerging threat intelligence (Indicators of Compromise, updated rules, etc.) to identify affected systems and the scope of the attack. Review and collect asset data (logs, configurations, running processes, ) on these systems for further investigation. Determine and direct remediation and recovery efforts including tasking of IHT1 as needed. Determine and request engineering, forensics, or threat intelligencesupport. Inform and brief status of incidents to CSOC manager, CISO, DCIO, or CIO. May manage and configure security monitoring tools (SIEM, IDS, Firewall, Access Control Lists, etc.) to mitigate existing threats / vulnerabilities. Interface and take guidance from the CSOC manager (government position). Review trouble tickets generated by Tier 1. Review threat intel and create notifications and share with specified personnel. Handle other tasks that tier II level of experience and talent can complete. Design incident response for cloud service models. Perform damage assessments. Preserve evidence integrity according to standard operating procedures or national standards. Protect networks against (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters). Recognize and categorize types of vulnerabilities and associated attacks. Secure network communications. Use security event correlation Tools. Identify, capture, contain, and report malware. Utilize the SOC standard operating procedures (SOP) to perform daily tasks, resolve incidents and preserve evidence integrity. May provide input for and assist with updating procedures.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
501-1,000 employees