Binary Defense · 11 hours ago
Tier 2 SOC Analyst - Microsoft Sentinel
Maximize your interview chances
Cyber SecurityInformation Technology
Insider Connection @Binary Defense
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Actively participate in and contribute to 24x7x365 security operations
Actively monitor and react across multiple customer environments and provide comprehensive analysis and investigation of notable events as directed
Communicate and collaborate with customers through the lifecycle of all escalated security events and investigations.
Proactively identify areas of maturation surrounding detections and playbooks while collaborating across organizational lines to implement proposed changes without compromising key tactical vantage points of visibility.
Proactively identify opportunities to improve workflow of junior analysts within applicable services
Mentor assigned Tier 1 SOC Analysts
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
3+ years experience working within a Security Operations Center (SOC).
Solid experience utilizing Microsoft Sentinel
3+ years experience working across multiple security disciplines (DFIR, log analysis, packet analysis, etc.)
Demonstrated knowledge and experience with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework
Preferred
Experience working within 1 or more SOAR platforms preferred.
Preferred certifications: CISSP, GCIH, GCIA, GCDA, GMON
Company
Binary Defense
Binary Defense is a cybersecurity company offering security solutions to monitor, detect, and respond to cyberattacks.
Funding
Current Stage
Growth StageTotal Funding
$36MKey Investors
Invictus Growth Partners
2022-11-02Private Equity· $36M
Recent News
Company data provided by crunchbase