11:11 Systems · 20 hours ago
SOC Analyst
Maximize your interview chances
Information Services
No H1BU.S. Citizen Only
Insider Connection @11:11 Systems
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Investigate, triage, escalate and document security alerts in accordance with protocols and established SLOs/SLAs using a variety of tools used in our Security Operations Center such as SIEM, EDR, CRS and SOAR.
Determine tactics, techniques, and procedures (TTPs) for intrusion sets and align with MITRE ATT&CK and/or other frameworks.
Work with our customers on communicating security events relevant to their network infrastructure and record all interactions and pertinent information in internal ticketing platforms.
Document and communicate feedback or service improvement suggestions by customers to the appropriate internal teams.
Identify and suggest possible improvements to SOC operational procedures and analysis methodologies.
Handle service support requests for active directory accounts, two factor authentication, SSL VPN and other customer facing systems.
Share responsibility for maintaining documentation on all incidents and job-related procedures.
Participate regularly in Security Operations Center working groups and collaborate across departmental lines to ensure the security of customer environments.
Remain current on trends/technologies in the information security industry and develop depth in your desired cyber discipline and/or technologies.
Assist with training other analysts by conducting training, documenting findings in internal knowledgebase, relating improvements and sharing information.
Other duties as assigned.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
2+ years of experience in IT
1+ years of security operations, threat hunting, or a related field with proven experience in incident response triage and investigation
Demonstrated knowledge of various security methodologies/processes and technical security solutions (firewall and network/security devices)
Demonstrated knowledge of TCP/IP Protocols, network analysis, and network/security applications
Strong understanding of network security concepts, operating systems, and malware analysis techniques
Strong understanding and experience with Security systems and tools such as SIEM, EDR, CRS and SOAR platforms
Demonstrated motivation to expand skillset through participation in security training
Ability to multi-task, prioritize, and manage time effectively
Excellent verbal and written communication skills with strong attention to detail
Excellent customer service skills
Must be a US Citizen
Must be legally eligible to work in [US] without visa sponsorship
Must be able to remain physically located in the continental United States during your period of employment
Preferred
CySA+ or CFR and GCIH certification preferred or obtained within 6 months
Information technology experience in areas not particular to security such as help desk, systems administration, end user support, etc.
Benefits
401k Plan with Company Match
Healthcare, vision and dental Insurance Plan
Life Insurance
Short-Term Disability Insurance
Long-Term Disability Insurance
Paid Vacation & Holidays
Leaves – primary care and new parent leave, maternity leave
Wellness Program
Company
11:11 Systems
11:11 Systems is creating a new model delivering the power of ''Everything Connected'' in connectivity, cloud, and security solutions.
Funding
Current Stage
Late StageTotal Funding
unknownKey Investors
Tiger Infrastructure Partners
2021-09-22Private Equity
Recent News
2024-11-24
2024-06-03
Company data provided by crunchbase