Your background :
As a SOC Analyst, you have :
- 2 - 5 years of experience in security incident response and technical forensics investigation
- 2 - 5 years of experience in IT Network or Cyber Operations
- Incident handling and forensics skills including knowledge of common probing and attack methods, network / service discovery, system assessment, viruses and other forms of malware.
- Ability to monitor and analyze SIEM, endpoint, network (Firewall,IPS), and application logs
- Extensive documentation skills with Excel, PowerPoint and ticketing systems
- Ability to prepare reports of analysis and results to provide briefings to management
- Skills in performing and optimizing operational processes
- Technical expertise in supporting modern and cutting-edge security technologies
Preferred
Bachelor s degree in information security, Computer Science or equivalentInformation Security Certifications such as CISSP, CRISC, and / or CISMExperience interfacing with other internal or external organizations regarding failure and incident response situationsKnowledgeable and experienced in :
SIEM (Exabeam) or other UEBA platformIDS / IPS (Cisco / Sourcefire / Palo)EDR (CrowdStrike)Email Security (Proofpoint)IRT CoordinationSOC / MSSDaily Threat Dashboard ReportingMITRE Framework implementation and auditingScripting and automationSkills Required
EDR, Siem, Cissp, crisc