Sr. SOC Analyst @ Optiv | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
Sr. SOC Analyst jobs in US-N. TX-Home
Be an early applicantLess than 25 applicants
company-logo

Optiv · 3 days ago

Sr. SOC Analyst

Wonder how qualified you are to the job?

ftfMaximize your interview chances
ConsultingTraining

Insider Connection @Optiv

Discover valuable connections within the company who might provide insights and potential referrals, giving your job application an inside edge.

Responsibilities

Provide deep level analysis for client investigations utilizing customer provided data sources, audit, and monitoring tools at both the government and enterprise level.
Work closely with Technology Engineers, Architects, and Threat Analysts to service customers.
Provide both Sr. level SOC support as well as Systems Administration duties.
Write professional reports on potential security incidents identified in customer environments.
Maintain an understanding of security threats, vulnerabilities, and exploits.
Perform operational tasks within the platforms under management and implementation.
Perform responsibilities of the Service Desk within agreed SLAs.
Identify service improvement items to enhance team performance.
Analyze security enforcement technologies including SIEM, anti-virus, and firewalls.
Train clients regarding mitigation of identified threats and provide ongoing recommendations.
Research current threats and attack vectors.
Perform investigations on escalations and discuss security posture with clients.
Provide gap analysis for clients to enhance their security posture.
Develop SOPs, Playbooks, and runbooks.
Increase efficiency and effectiveness of security analysis provided by the threat analysis team.
Train new analysts on security and tools.
Create and maintain Content Catalog based on security essentials and the evolving threat landscape.
Provide quality assurance review of security alerts handled by team members.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Information SecuritySecurity Operations CenterManaged Security ServiceConfiguration ManagementAutomation ToolsLinux System AdministrationWindows System AdministrationNetwork AdministrationNetwork EngineeringData AnalysisSIEMIDS MonitoringWeb Based AttacksOWASP Top 10SANS Top 20Active DirectoryPrivilege EscalationAnti-VirusIntrusion PreventionMalware ProtectionVulnerability ScoringVulnerability AssessmentTime ManagementCommunication SkillsProblem SolvingSIEM platformsQRadarLogRhythmMcAfee/NitroArcSight

Required

Four or more years of full-time professional experience in the Information Security field
Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation
One or more of the following certifications (MCSE, CompTIA Server+, Red Hat Certification System Administrator or Engineer, AWS SysOps Administrator
Experience working with configuration management and automation tools such as Ansible, Cher, Puppet and SaltStack
3-5+ years Linux/Windows System Administration experience
3-5+ years network admin or engineering experience
Excellent time management, reporting, and communication skills including customer interactions and executive presentations
Data analysis using SIEM, Database tools, and Excel
Experience troubleshooting security devices and SIEM
Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility
IDS monitoring/analysis with tools such as Sourcefire and Snort
Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks
Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks
Familiarity with SANS top 20 critical security controls
Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening
Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS)
Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro
Ability to identify common false positives and make suggestions on tuning
Understanding of root causes of malware and proactive mitigation
Propagation of malware in enterprise environments
Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
Familiarity with concepts associated with Advanced Persistent Threats and "targeted malware"
Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment
Covert channels, egress, and data exfiltration techniques
Familiarity with vulnerability scoring systems such as CVSS
Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks

Preferred

Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)

Benefits

Work/life balance
Professional training resources
Volunteer Opportunities

Company

Optiv is a cyber security solutions provider in North America that help clients plan, build and run successful cyber security programs.

Funding

Current Stage
Late Stage
Total Funding
unknown
Key Investors
CVC Capital PartnersSverica Capital
2023-05-31Debt Financing· Undisclosed
2017-01-01Series Unknown· Undisclosed
2016-12-05Acquired· by Kohlberg Kravis Roberts ($1.9B)

Leadership Team

leader-logo
Nate Brady
Chief Financial Officer
linkedin
leader-logo
Julie Talbot-Hubbard
Senior Vice President, Cyber Protection and Identity
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot