SOC Analyst Jr

ASM ResearchChandler, AZ
4d

About The Position

Supports the creation of cyber-intelligence tools / methods and assists with research and analysis in order to mitigate and eliminate data and cyber security risks. Assists with the development of acceptance criteria for cybersecurity architecture. Monitor and analyze network traffic, Intrusion Detection Systems (IDS), security events and logs. Prioritizing and differentiating between potential intrusion attempts and false alarms. Develop, maintain, and follow SOC Standard Operating Procedures (SOPs). Support daily and monthly situation reporting per shift. Proactively reviewing large data sets for anomalous activity. Create detective content for monitoring devices such as IDS and SIEM and advise on proactive blocks for security architecture. Creating and tracking security investigations to resolution. Composing security alert notifications and other communications. Advising incident responders in the steps to take to investigate and resolve computer security incidents. Staying up to date with current vulnerabilities, attacks, and countermeasures.

Requirements

  • Bachelor’s Degree in Computer Science or a related field or equivalent experience.
  • 2+ years of experience in systems security.
  • Active Secret Clearance
  • Certified Ethical Hacking (CEH) certification or CompTIA CySA+ and (within 6 months of hire) any from the CSSP Analyst, Infrastructure Support, or IR from the DOD 8570 list (or other similar certifications as approved by Government)
  • Ability to work a shift schedule.
  • Able to multitask and give equal attention to a variety of functions while under pressure.
  • Must be able to communicate effectively and clearly present technical approaches and findings.
  • Exercises a limited degree of latitude in determining technical objectives of assignments.
  • Experience in handling incident response.
  • Strong attention to detail.

Responsibilities

  • Monitor and analyze network traffic, Intrusion Detection Systems (IDS), security events and logs.
  • Prioritizing and differentiating between potential intrusion attempts and false alarms.
  • Develop, maintain, and follow SOC Standard Operating Procedures (SOPs).
  • Support daily and monthly situation reporting per shift.
  • Proactively reviewing large data sets for anomalous activity.
  • Create detective content for monitoring devices such as IDS and SIEM and advise on proactive blocks for security architecture.
  • Creating and tracking security investigations to resolution.
  • Composing security alert notifications and other communications.
  • Advising incident responders in the steps to take to investigate and resolve computer security incidents.
  • Staying up to date with current vulnerabilities, attacks, and countermeasures.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service