SOC Tier I Analyst

Northern Technologies Group, Inc.Tampa, FL
12dOnsite

About The Position

As a SOC Tier 1 Analyst, you will play a critical role in safeguarding our clients' information systems and networks against cyber threats. You will be responsible for monitoring security events, analyzing alerts, and escalating incidents as necessary to ensure timely resolution. Additionally, you will collaborate closely with cross-functional teams to implement proactive security measures and contribute insights to enhance our overall security posture. This position requires shift work, including nights, weekends, and holidays, as the SOC provides 24/7/365 support to our customers.

Requirements

  • Must be a US Citizen
  • 1 to 3 years of experience in cybersecurity, preferably in a SOC or related security operations environment
  • Active certification required: CompTIA Security+, ISC2 Certified in Cybersecurity (CC), or equivalent (e.g., CYSA+, PenTest+, SSCP, CISA)
  • Strong understanding of cybersecurity principles, threat vectors, and incident response methodologies
  • Strong analytical and problem-solving skills with a high attention to detail
  • Effective communication skills with the ability to explain technical issues to technical and non-technical audiences
  • Willingness and ability to work rotating shifts, including nights, weekends, and holidays

Nice To Haves

  • Associate or bachelor’s degree in cybersecurity, computer science, or related field
  • Hands-on experience with SIEM, IDS/IPS, and endpoint detection and response (EDR) tools (e.g., MS Defender, CrowdStrike, Sophos, SentinalOne)
  • Experience using ticketing systems (e.g., Microsoft Dynamics, ServiceNow, Jira) to track, document, and escalate security incidents and support requests efficiently
  • Hands-on experience using Splunk for security event monitoring, log analysis, and incident investigation within a SOC or cybersecurity environment.

Responsibilities

  • Monitor security alerts and events generated by various security tools, including SIEM, IDS/IPS, firewalls, and endpoint protection systems.
  • Analyze and triage security incidents to determine their severity and potential impact on client environments.
  • Perform initial investigation and containment of security incidents, following established procedures and protocols.
  • Document incident details, including the timeline of events, actions taken, and any associated artifacts.
  • Escalate complex incidents to Tier 2 or Tier 3 analysts for further investigation and resolution.
  • Provide timely updates and communication to clients regarding the status of ongoing incidents.
  • Collaborate with other SOC team members to share knowledge and improve incident response processes.
  • Stay abreast of emerging threats and vulnerabilities to enhance the effectiveness of security monitoring and threat detection.
  • The ability and willingness to gain vendor specific certifications.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Entry Level

Education Level

Associate degree

Number of Employees

51-100 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service