Security Operations Centre Analyst @ Energy Jobline | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
Security Operations Centre Analyst jobs in Massachusetts, United States
Be an early applicantLess than 25 applicantsPosted by Agency
company-logo

Energy Jobline ยท 2 days ago

Security Operations Centre Analyst

Wonder how qualified you are to the job?

ftfMaximize your interview chances
EnergyNuclear
check
Actively Hiring

Insider Connection @Energy Jobline

Discover valuable connections within the company who might provide insights and potential referrals, giving your job application an inside edge.

Responsibilities

Minimum 2 years+ hands-on experience in a SOC environment
Hold an industry-recognized information security qualification such as GIAC/GCIA/GCIH, CISSP or CompTIA Advanced Security Practitioner (CASP+) and/or SIEM-specific training and certification
A basic knowledge of compliance and regulatory frameworks such as Cyber Security Centre (NCSC) Cyber Assessment Framework (CAF) and ISO/IEC 27001/27002, GDPR
Experience with main security concepts/principles (CIA, threats, vulnerabilities, and exploits)
Working knowledge of the Cyber Kill Chain and/or Incident Response Phases and adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (Mitre ATT&CK)
Experience with the approach a threat actor takes to when attacking a network including phishing, port scanning, web application attacks, DDoS, lateral movement
Knowledge of SIEM and SOAR solutions, and Access Management and Data Loss Prevention tools and technologies preferably including FortiSIEM, Q-Radar, McAfee Web Gateway, McAfee ePolicy Orchestrator, Darktrace and Microsoft Defender. Microsoft Sentinel experience also an advantage
Working knowledge of security technologies including but not limited to EDR, AV, IDS/IPS, NAC, AD, Web Filtering, Email Filtering, Behavioral Analytics, TCP/IP Protocols, network analysis, and network/security applications
Proficient in at least one or more of the following, within a corporate environment: Endpoint operating systems (e.g. Microsoft, Linux, and/or OS X), Core networking principles (e.g. switches, routers, wireless access points, Internet), Infrastructure security devices (e.g. firewalls, proxies, IDS/IPS), Support enterprise-level services (e.g. AD, DNS, DHCP, IIS, Apache, VPN/DA, Databases), Anti-virus, anti-malware, ransomware, data leak protection, Vulnerability management, endpoint forensics, intrusion analysis activities, Azure Cloud computing platform, Open Source Intelligence and security tools

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

SOC Environment ExperienceInformation Security QualificationCompliance KnowledgeSecurity ConceptsCyber Kill ChainIncident ResponseAdversarial TacticsSIEM KnowledgeSOAR SolutionsAccess ManagementData Loss PreventionSecurity TechnologiesCorporate Environment ProficiencyEndpoint Operating SystemsCore Networking PrinciplesInfrastructure Security DevicesEnterprise-Level Services SupportAnti-VirusVulnerability ManagementAzure Cloud ComputingOpen Source Intelligence

Required

Minimum 2 years+ hands-on experience in a SOC environment
Hold an industry-recognized information security qualification such as GIAC/GCIA/GCIH, CISSP or CompTIA Advanced Security Practitioner (CASP+) and/or SIEM-specific training and certification
Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, related field or equivalent training and/or experience
A basic knowledge of compliance and regulatory frameworks such as Cyber Security Centre (NCSC) Cyber Assessment Framework (CAF) and ISO/IEC 27001/27002, GDPR
Experience with main security concepts/principles (CIA, threats, vulnerabilities, and exploits)
Working knowledge of the Cyber Kill Chain and/or Incident Response Phases and adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (Mitre ATT&CK)
Experience with the approach a threat actor takes to when attacking a network including phishing, port scanning, web application attacks, DDoS, lateral movement
Knowledge of SIEM and SOAR solutions, and Access Management and Data Loss Prevention tools and technologies preferably including FortiSIEM, Q-Radar, McAfee Web Gateway, McAfee ePolicy Orchestrator, Darktrace and Microsoft Defender. Microsoft Sentinel experience also an advantage
Working knowledge of security technologies including but not limited to EDR, AV, IDS/IPS, NAC, AD, Web Filtering, Email Filtering, Behavioral Analytics, TCP/IP Protocols, network analysis, and network/security applications
Proficient in at least one or more of the following, within a corporate environment: Endpoint operating systems (e.g. Microsoft, Linux, and/or OS X), Core networking principles (e.g. switches, routers, wireless access points, Internet), Infrastructure security devices (e.g. firewalls, proxies, IDS/IPS), Support enterprise-level services (e.g. AD, DNS, DHCP, IIS, Apache, VPN/DA, Databases), Anti-virus, anti-malware, ransomware, data leak protection, Vulnerability management, endpoint forensics, intrusion analysis activities, Azure Cloud computing platform, Open Source Intelligence and security tools

Company

Energy Jobline

twittertwittertwitter
company-logo
Energy Jobline offers an energy & nuclear job board, energy hub, and industry training services.

Funding

Current Stage
Early Stage
Company data provided by crunchbase
logo

Orion

Your AI Copilot