Security Analyst SIEM - SOC REQUIRED Posted Feb 15
The Job Jobber , Media, PA
Salary: $55,000 - $75,000

Love your job!

The Security Analyst will operate in a role focused on monitoring, responding and tuning SIEM environments. This role will also include responding to SIEM support tickets, assisting with data onboarding for new SIEM customers and content tuning to ensure false positive alarms are addressed within the customer environment. The Analyst will also assist in performing threat hunting, malware analysis, event investigation and work directly with customer contacts to assist in remediating security related issues and incidents.

The Security Analyst is expected to be familiar with a wide range of security tools and understand basic security fundamentals. The Security Analyst will perform information security event analysis and must possess knowledge of operating systems, TCP/IP Networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis. The Security Analyst will also utilize vulnerability assessment software in support of customer requirements. Employees must be able to research, develop, and communicate solutions to detected security incidents in a timely and professional manner.

Daily Responsibilities:

Monitor and analyze SIEM events and security tickets

Investigate security events, customer tickets, SIEM software issues, etc

Perform traffic analysis, event analysis and investigation of Firewall, IDS/IPS, AV, HIDS, NIDS, Syslog, server log events

Perform and analyze vulnerability scanning within customer environments

Follow defined SOP's and meet defined SLA's for SOC processes

Work directly with customers to assist in event response and incident remediation

Perform development work within the SIEM systems and ticketing systems to remediate false positives, assist in onboarding new data sources, develop new content

Perform day shift work but also be available on call in a rotation - this could involve responding to customer issues and events around the clock during the on call rotation

Perform pre-sales demo's and participate on customer calls as needed

Provide reporting and monthly/quarterly customer environment reviews - assist in data gathering and providing followup to customers

Skillset Required:

Certifications desired (one or more): CISSP, GIAC, Security+, CEH

Event and incident response experience

SOC experience

Networking knowledge - must understand and be able to dissect a data packet

Knowledge of malware analysis and reverse engineering

Firewall, IDS/IPS, UTM experience

Specific toolset experience would be helpful: Fortigate, Palo Alto, Symantec, Splunk, SIEMonster (Elasticsearch, Kibana, Logstash), SyslogNG, OpenVAS, Nessus

Windows and Linux command line comfort and familiarity

Employment Type: Permanent
Work Hours: Full Time

Pay: $55,000 to $75,000 USD
Pay Period: Annual

Click here to apply - Please mention that you saw the job on The Tech Report