Senior SOC Analyst
Sunrise Systems, Inc.
Job Description
Shifts Shifts would either be Tuesday-Saturday 12pm-9pm (Saturday hours are flexible) or Sunday-Thursday (Sunday hours are flexible) 12pm-9pm. Responsibilities Conducts daily traffic analysis, identifies and characterizes anomalous activity. Performs in-depth system and network forensics to identify and eradicate threats.
Characterizes and analyzes network traffic to identify anomalous activity and potential threats to network resources. Generates incident reports and investigates suspicious network and system activity. Performs cyber defense trend analysis and reporting.
Determines tactics, techniques, and procedures (TTPs) for intrusion sets. Reconstructs a malicious attack or activity based off network traffic. Proactively identifies threats to the enterprise and initiates the distribution of enterprise-wide alerts.
Coordinates with enterprise-wide cyber defense staff to validate network alerts. Provides timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities, distinguishing these incidents and events from benign activities. Monitors software patches, security fixes and tests and validates modified systems.
Performs security reviews and identifies security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy. Recommends computing environment vulnerability corrections. Processes, documents, and coordinates resolution of cyber incidents with appropriate teams.
Notifies designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulates the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan. Qualifications A solid, end-to-end understanding of Information technology systems, especially as they apply to security. Ability to successfully triage security detections and alerts from any source (network, endpoint, audit logs, identity, etc.), perform incident response and support incident management.
Ability to work under pressure, prioritize issues, and maintain sufficient attention to ensure an appropriate response to cyber alerts and incidents. Must have professional engagement and customer service skills to positively support stakeholder institutions and partners statewide. Fast learner; ability to work and solve problems creatively.
Two years of experience in a security operations environment, or related work and demonstrated interest in security operations. #J-18808-Ljbffr