Ignitec Inc ยท 3 hours ago
JR. Security Operations Center Analyst (SOC Analyst)
Maximize your interview chances
Insider Connection @Ignitec Inc
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Security platform and technology capabilities; SIEM utilization skills with the ability to analyze security events from multiple monitoring and logging sources to identify and/or confirm suspicious activity.
Ability to analyze large data sets and unstructured data to identify trends and anomalies indicative of malicious activity.
Knowledge of, and experience with, TCP/IP protocol and network/packet analysis.
Knowledge of current security threats, techniques, and landscape, and a dedicated desire to research current information security landscape.
Perform security event triage and analysis with knowledge in current security threats and techniques.
Respond to different attack vectors such as data exfiltration, DDoS, malware, insider risk, and phishing.
Experience with IT Infrastructure designs, technologies, products, and services. This should include knowledge of networking protocols, firewall functionality, host and network intrusion detection systems, operating systems, databases, encryption, load balancing, and other technologies.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
+2-3 years of relative experience with a Bachelor's degree in Computer Science or a related discipline (preferred) and experience in security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination of education and work experience.
Security platform and technology capabilities; SIEM utilization skills with the ability to analyze security events from multiple monitoring and logging sources to identify and/or confirm suspicious activity.
Ability to analyze large data sets and unstructured data to identify trends and anomalies indicative of malicious activity.
Knowledge of, and experience with, TCP/IP protocol and network/packet analysis.
Knowledge of current security threats, techniques, and landscape, and a dedicated desire to research current information security landscape.
Perform security event triage and analysis with knowledge in current security threats and techniques.
Respond to different attack vectors such as data exfiltration, DDoS, malware, insider risk, and phishing.
Experience with IT Infrastructure designs, technologies, products, and services. This should include knowledge of networking protocols, firewall functionality, host and network intrusion detection systems, operating systems, databases, encryption, load balancing, and other technologies.