Optiv · 5 days ago
Sr. SOC Analyst
Wonder how qualified you are to the job?
ConsultingTraining
Insider Connection @Optiv
Responsibilities
This role will provide both Sr. level SOC support (66%) as well as Systems Administration duties (33%).
High level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments to include timeline of events.
Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.
Perform basic operational tasks within the platforms under management and implementation including user and device provisioning/deprovisioning, user access, asset onboarding, configuration changes, password resets, email archival, multifactor authentication, and remote support of end-user assets.
Perform operational responsibilities of the Service Desk within agreed SLAs (Distribute reports, monitor activities, respond to events and alerts, etc.).
Identify service improvement items to reduce team member issues, increase satisfaction, boost team dynamics and use data to progress performance.
Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
Perform knowledge transfers, document, and train clients regarding mitigation of identified threats.
Provide ongoing recommendations to peers and customers on tuning and best practices.
Actively research current threats and attack vectors being exploited in the wild
Actively work with analysts and perform investigations on escalations.
Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach.
Provide gap analysis for clients to better their security posture.
Maintain and develop SOPs for threat analyst team.
Develop and maintain Playbooks and runbooks.
Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team.
Training of new analysts on security and tools
Create and maintain Content Catalog based on security essentials and the evolving threat landscape.
Provide quality assurance (QA) review of security alerts handled by Team members.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Four or more years of full-time professional experience in the Information Security field
Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation
One or more of the following certifications (MCSE, CompTIA Server+, Red Hat Certification System Administrator or Engineer, AWS SysOps Administrator
Experience working with configuration management and automation tools such as Ansible, Cher, Puppet and SaltStack
3-5+ years Linux/Windows System Administration experience
3-5+ years network admin or engineering experience
Excellent time management, reporting, and communication skills including customer interactions and executive presentations
Data analysis using SIEM, Database tools, and Excel
Experience troubleshooting security devices and SIEM
Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility
IDS monitoring/analysis with tools such as Sourcefire and Snort
Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks
Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks
Familiarity with SANS top 20 critical security controls
Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening
Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS)
Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro
Ability to identify common false positives and make suggestions on tuning
Understanding of root causes of malware and proactive mitigation
Propagation of malware in enterprise environments
Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
Familiarity with concepts associated with Advanced Persistent Threats and 'targeted malware'
Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment
Covert channels, egress, and data exfiltration techniques
Familiarity with vulnerability scoring systems such as CVSS
Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks
Preferred
Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)
Benefits
Work/life balance
Professional training resources
Volunteer Opportunities
Company
Optiv
Optiv is a cyber security solutions provider in North America that help clients plan, build and run successful cyber security programs.
Funding
Current Stage
Late StageTotal Funding
unknownKey Investors
CVC Capital PartnersSverica Capital
2023-05-31Debt Financing· Undisclosed
2017-01-01Series Unknown· Undisclosed
2016-12-05Acquired· by Kohlberg Kravis Roberts ($1.9B)
Leadership Team
Recent News
CRN Magazine
2024-05-23
Company data provided by crunchbase