Sr. SOC Analyst

11 May 2024
Apply

Company Overview:Join a global a lternative investment manager operating in the credit, private equity, and real estate markets asset management company committed to safeguarding clients' digital assets and infrastructure. We pride ourselves on our dedicated team of global cybersecurity professionals who work tirelessly to ensure the highest level of protection for our clients.Description:The SOC Analyst – highly skilled Level 3 SOC Analyst to join our dynamic Global SOC team. The successful candidate will play a pivotal role in maintaining the security posture of our organization by effectively responding to and investigating security incidents and events and will be responsible for day-to-day security operations by responding to and investigating security events of interest and recommending or taking corrective action by working with IT and non-IT team members. They will also respond to security incident and investigation requests in line with established SIRT processes and procedures, within defined service level targets. SOC Responsibilities: Responsible for initial or secondary triage of security incidents identified by internal controls or external SOC partners Proficient in Threat Research and understands the latest malware trends, common attack TTPs, and the general threat landscape Proficient in Incident Response and automation workflows as it relates to Security Operations Detects, identifies, and responds to cyber events, and incidents in line with cyber security policies and procedures Responsible for working with Incident responders and SOC Manager in documenting the incident life cycle, conducting handoffs’, escalation, and providing support during cyber incident investigations Strictly adhere to service level agreements (SLAs), metrics and business scorecard obligations for ticket handling of security incidents and events. Provide expert guidance and support to Level 1 and Level 2 SOC analysts in analyzing and responding to security incidents.Documentation and Reporting: Evaluate and update current SOC procedures and runbooks update as required or directed Providing daily handover / shift details Ensure timely delivery of Daily / Weekly / Monthly reporting as per requirements of Management General Requirements: Candidate should be willing to work in shifts occasionally as required by SOC Management Candidate should be able to work 3 days from Ares Office located in Culver City Excellent communication and collaboration skills, with the ability to work effectively with cross-functional teams. Experience with one or more Security Information and Event Management (SIEM) solutions Experience in security monitoring, Incident Response (IR) and security remediation Strong knowledge and experience in Security Event Analysis capability Proficiency in conducting detailed security incident investigations and root cause analysis. Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.) Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats Strong analytical and problem-solving skills High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity Ability to interact effectively at all levels with sensitivity to cultural diversity Ability to adapt as the external environment and organization evolves Passionate about Cybersecurity domain and has the inclination to learn current technologies / concepts / improvements Knowledge of cyber security frameworks and attack methodologies Experience working with EDRs, Proxies, and anti-virus Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologiesSkills:SOC, Information Security, Splunk, Incident Response, SIEM, Threat Hunting, SPLTop Skills Details:SOC, Information SecurityAdditional Skills & Qualifications: F inance Enthusiast Threat Hunting, Incident Response, eForensics Experience with Scripting/ Automation Fluent with Splunk, SIEM, SPL, Write Queries Professional Certifications like CEH, CCSE, CCNA, Security+, etc. SIEM certification or Security technology related certification is a plusExperience Level:Intermediate LevelAbout TEKsystems: We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.

Full-time
  • ID: #51677594
  • State: California Culvercity 90230 Culvercity USA
  • City: Culvercity
  • Salary: USD TBD TBD
  • Showed: 2024-05-11
  • Deadline: 2024-07-11
  • Category: Et cetera
Apply