Sr. SOC Analyst @ Optiv | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
Sr. SOC Analyst jobs in Dallas, TX
51 applicants
company-logo

Optiv · 4 days ago

Sr. SOC Analyst

Wonder how qualified you are to the job?

ftfMaximize your interview chances
ConsultingTraining

Insider Connection @Optiv

Discover valuable connections within the company who might provide insights and potential referrals, giving your job application an inside edge.

Responsibilities

This role will provide both Sr. level SOC support (66%) as well as Systems Administration duties (33%).
High level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments to include timeline of events.
Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.
Perform basic operational tasks within the platforms under management and implementation including user and device provisioning/deprovisioning, user access, asset onboarding, configuration changes, password resets, email archival, multifactor authentication, and remote support of end-user assets.
Perform operational responsibilities of the Service Desk within agreed SLAs (Distribute reports, monitor activities, respond to events and alerts, etc.).
Identify service improvement items to reduce team member issues, increase satisfaction, boost team dynamics and use data to progress performance.
Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
Perform knowledge transfers, document, and train clients regarding mitigation of identified threats.
Provide ongoing recommendations to peers and customers on tuning and best practices.
Actively research current threats and attack vectors being exploited in the wild
Actively work with analysts and perform investigations on escalations.
Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach.
Provide gap analysis for clients to better their security posture.
Maintain and develop SOPs for threat analyst team.
Develop and maintain Playbooks and runbooks.
Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team.
Training of new analysts on security and tools
Create and maintain Content Catalog based on security essentials and the evolving threat landscape.
Provide quality assurance (QA) review of security alerts handled by Team members.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Information SecuritySecurity Operations Center (SOC)Managed Security Service (MSS)Certifications MCSECertifications CompTIA Server+Certifications Red Hat Certification System AdministratorCertifications EngineerCertifications AWS SysOps AdministratorConfiguration ManagementAutomation Tools AnsibleAutomation Tools CherAutomation Tools PuppetAutomation Tools SaltStackLinux System AdministrationWindows System AdministrationNetwork AdministrationNetwork EngineeringData AnalysisSIEMTroubleshootingIDS MonitoringWeb Based AttacksOWASP Top 10DoS AttacksSANS Top 20 Critical Security ControlsEnterprise Windows SecurityActive DirectoryAnti-Virus (AV)Host Based Intrusion Prevention (HIPS)Malware Protection

Required

Four or more years of full-time professional experience in the Information Security field
Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation
One or more of the following certifications (MCSE, CompTIA Server+, Red Hat Certification System Administrator or Engineer, AWS SysOps Administrator
Experience working with configuration management and automation tools such as Ansible, Cher, Puppet and SaltStack
3-5+ years Linux/Windows System Administration experience
3-5+ years network admin or engineering experience
Excellent time management, reporting, and communication skills including customer interactions and executive presentations
Data analysis using SIEM, Database tools, and Excel
Experience troubleshooting security devices and SIEM
Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility
IDS monitoring/analysis with tools such as Sourcefire and Snort
Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks
Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks
Familiarity with SANS top 20 critical security controls
Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening
Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS)
Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro
Ability to identify common false positives and make suggestions on tuning
Understanding of root causes of malware and proactive mitigation
Propagation of malware in enterprise environments
Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
Familiarity with concepts associated with Advanced Persistent Threats and 'targeted malware'
Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment
Covert channels, egress, and data exfiltration techniques
Familiarity with vulnerability scoring systems such as CVSS
Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks

Preferred

Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)

Benefits

Work/life balance
Professional training resources
Volunteer Opportunities

Company

Optiv is a cyber security solutions provider in North America that help clients plan, build and run successful cyber security programs.

Funding

Current Stage
Late Stage
Total Funding
unknown
Key Investors
CVC Capital PartnersSverica Capital
2023-05-31Debt Financing· Undisclosed
2017-01-01Series Unknown· Undisclosed
2016-12-05Acquired· by Kohlberg Kravis Roberts ($1.9B)

Leadership Team

leader-logo
Nate Brady
Chief Financial Officer
linkedin
leader-logo
Julie Talbot-Hubbard
Senior Vice President, Cyber Protection and Identity
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot