System Analyst SOC-NOC II

Core CivicBrentwood, TN
8d$75,600 - $80,000Onsite

About The Position

The System Analyst Security Operations Center/Network Operations Center (SOC/NOC) II manages daily operational disruptions, team workloads and ensures timely resolution of incidents while adhering to network and security KPIs, SLAs and regulations. Delivers 24/7 support for CoreCivic's network and security operations through advanced troubleshooting, threat analysis and incident response. Ensures system security and aids in the company's cyber regulatory compliance.

Requirements

  • Graduate from an accredited college or university with a Bachelor's degree in Computer Science, Information Systems or a related field is required.
  • Two years of experience in Technology, including SOC/NOC operations and management is required.
  • CompTIA or equivalent Network+ and/or Security+ certification is required.
  • Must be familiar with routing and switching technologies and wireless network equipment.
  • Must demonstrate the ability to work independently, effectively multi-task and delegate responsibilities.
  • Must be able to adapt and be willing to work rotating shifts, including nights, weekends and holidays.
  • Proficiency in Microsoft Office applications is required

Responsibilities

  • Provides real-time event monitoring of security systems such as SIEM, IDS/IPS and firewalls.
  • Monitors network traffic for unusual activity and potential threats.
  • Engages in proactive threat hunting using Microsoft Defender and other advanced tools to identify and mitigate potential threats.
  • Works closely with other IT and security team colleagues to coordinate efforts and share information about potential threats and vulnerabilities.
  • Monitors and supports network infrastructure i.e. routers, switches, firewalls, VPNs and other critical systems for performance, availability and reliability.
  • Assists with network performance tuning and capability planning to ensure optimal network operation.
  • Conducts thorough threat and root cause analysis and collaborates in resolving identified issues.
  • Documents incidents thoroughly and generates Root Cause Analysis (RCA) reports.
  • Utilizes Microsoft Defender ATP for advance threat protection and endpoint detection and end response (EDR).
  • Resolves high-priority incidents such as malware, phishing and DDoS attacks.
  • Escalates unresolved issues to the manager or relevant stakeholder community as required.
  • Uses threat intelligence and automation to enhance the effectiveness of network security operations.
  • Troubleshoots and resolves network issues such as outages, latency, packet loss and connectivity problems.
  • Coordinates with internal teams and third-party vendors for rapid issue resolution.
  • Ensures timely escalation of persistent or critical network issues to the appropriate team.
  • Develops and facilitates training sessions for team development.
  • Educates employees on security policies and best practices on how to recognize potential threats.
  • Follows, implements and improves security policies, procedures and controls consistently.
  • Maintains detailed documentation and briefings to ensure seamless handover of incidents between shifts.
  • Domestic U.S. travel is required.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service