Description:
The SOC Tier 2 Analyst supports a 24/7/365 Security Operations Center and monitors security tools and solves security incidents raised by the first tier response. The analyst follows standard operating procedures for detecting, classifying, and reporting incidents under the supervision of Tier 3 staff.
Requirements:
Security Oerations Center (SOC) environment experience with some security engineering and monitoring experience such as
- Dedicated monitoring and analysis of cyber security events (Triage)
- Event of Interst (EOI) handling and escalation
- Incident Response generation and reporting
- Processing of incident communications to include initial reporting, follow-ups, requests for information and resolution activity
Tools: Splunk, SourceFire Imperva WAF, McAfee ePO. ForeScout NAC is a plus
Certifications: COMPTIA Security + other relevant networking or software engineering certifications desired
Education: Bachelors Degree in an IT related field and 7 years of experience. Additional experience can be substituted for degree. Associates + 11, High school + 13.
Additional Requirements:
Must possess excellent written and oral communication skills. Self-motivated with the ability to work independently.
An Active Top Secret is desired. An Active Secret Clearance will be considered.
by via developer jobs - Stack Overflow
No comments:
Post a Comment