![company-logo](https://images.crunchbase.com/image/upload/t_cb-default-original/v1443072205/l69kcd1mh1techzevbcg.png)
Optiv · 3 days ago
Sr. SOC Analyst
Wonder how qualified you are to the job?
ConsultingTraining
Insider Connection @Optiv
Responsibilities
Provide deep level analysis for client investigations utilizing customer provided data sources, audit, and monitoring tools at both the government and enterprise level.
Work closely with Technology Engineers, Architects, and Threat Analysts to service customers.
Provide both Sr. level SOC support as well as Systems Administration duties.
Write professional reports on potential security incidents identified in customer environments.
Maintain an understanding of security threats, vulnerabilities, and exploits.
Perform operational tasks within the platforms under management and implementation.
Perform responsibilities of the Service Desk within agreed SLAs.
Identify service improvement items to enhance team performance.
Analyze security enforcement technologies including SIEM, anti-virus, and firewalls.
Train clients regarding mitigation of identified threats and provide ongoing recommendations.
Research current threats and attack vectors.
Perform investigations on escalations and discuss security posture with clients.
Provide gap analysis for clients to enhance their security posture.
Develop SOPs, Playbooks, and runbooks.
Increase efficiency and effectiveness of security analysis provided by the threat analysis team.
Train new analysts on security and tools.
Create and maintain Content Catalog based on security essentials and the evolving threat landscape.
Provide quality assurance review of security alerts handled by team members.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Four or more years of full-time professional experience in the Information Security field
Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation
One or more of the following certifications (MCSE, CompTIA Server+, Red Hat Certification System Administrator or Engineer, AWS SysOps Administrator
Experience working with configuration management and automation tools such as Ansible, Cher, Puppet and SaltStack
3-5+ years Linux/Windows System Administration experience
3-5+ years network admin or engineering experience
Excellent time management, reporting, and communication skills including customer interactions and executive presentations
Data analysis using SIEM, Database tools, and Excel
Experience troubleshooting security devices and SIEM
Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility
IDS monitoring/analysis with tools such as Sourcefire and Snort
Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks
Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks
Familiarity with SANS top 20 critical security controls
Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening
Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS)
Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro
Ability to identify common false positives and make suggestions on tuning
Understanding of root causes of malware and proactive mitigation
Propagation of malware in enterprise environments
Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
Familiarity with concepts associated with Advanced Persistent Threats and "targeted malware"
Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment
Covert channels, egress, and data exfiltration techniques
Familiarity with vulnerability scoring systems such as CVSS
Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks
Preferred
Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)
Benefits
Work/life balance
Professional training resources
Volunteer Opportunities
Company
Optiv
![company-logo](https://images.crunchbase.com/image/upload/t_cb-default-original/v1443072205/l69kcd1mh1techzevbcg.png)
Optiv is a cyber security solutions provider in North America that help clients plan, build and run successful cyber security programs.
Funding
Current Stage
Late StageTotal Funding
unknownKey Investors
CVC Capital PartnersSverica Capital
2023-05-31Debt Financing· Undisclosed
2017-01-01Series Unknown· Undisclosed
2016-12-05Acquired· by Kohlberg Kravis Roberts ($1.9B)
Leadership Team
Recent News
CRN Magazine
2024-05-23
Company data provided by crunchbase