Job description
Tier 1 Overflow Responsibilities :
- Develop new signatures and correlated searches based on a variety of requirements
- Document work within a security operations ticketing system
- Analyze data and events within the SIEM or SOAR for prioritization and priority elevation
- Identify data sources and analytics for inclusion into SIEM or SOAR
- Remote Client System Monitoring and Analysis
- Tracking, and reporting of security patch / upgrade implementation
- Scheduling, execution and tracking of vulnerability remediation activities
- Information gathering, port and vulnerability scanning and analysis according to policy
Tier 2 Responsibilities (Incident Response Leader) :
Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediationWork with client in remediation effortsNotify SOC manager of all elevated incidents and keep appraised of progressCollaborate with Tier 3 Analysts on Threat Hunting requirementsManage and administer the SOC tools (SIEM, SOAR, IDS, etc.)Develop reports and other capabilities to support the needs of our clientsDevelopment of security policies, processes, and procedureDevelopment and delivery of presentationsWorkload estimation for new clientsConducting security auditsMentor Tier 1 Analysts to grow and assist in Tier 2 requirementsQualifications
1 years of experience investigating security events and incidents or performing computer forensic analysis3 years SIEM experience; 1 years SOAR experience4 years of experience with Incident ResponseExperience in Critical Infrastructure OT systems and protocols to include SCADA, PLCs, etc.Familiarity and experience with Risk Management FrameworksScripting skills in any common language (Python, Perl, Bash, or Powershell)Skilled at using multiple operating systemsSkills Required
Powershell, Perl, Bash, Python, Scada