Location: West Hartford,CT, USA
Jr. SOC Analyst
24 - 36 Months
US Citizens required
Hybrid Schedule (2 days a week)
2nd Shift Pay Rate: $27.50/hr. (4pm - 12:30am)
3rd Shift Pay Rate: $28.75/hr. (12am - 8:30am)
Candidates should have the following:
Top 3 Required Skills:
Remote details – Hybrid schedule (2 days in office - Wednesday & Thursday)
Jr. SOC Monitoring Analyst
Job Description: The Junior SOC Monitoring Analyst utilizes internal processes and tools to detect and respond to various threats.
Primary Responsibilities:
Monitor, analyze and investigate alerts from various log sources including IDS/IPS, firewalls, proxies, servers, endpoints and other network devices in an enterprise security information and event monitoring (SIEM). Perform appropriate response or escalation activities using established event handling and incident response procedures based on risk categorization. Collaborate with peers and stakeholders across the Corporate and Business Unit cyber security and information technology organizations. Perform other duties as assigned.
Desired Qualifications: Applicable work experience or academic coursework in Network Support, Security Operations and conversant with cyber security concepts and techniques. Demonstrable knowledge of networking (TCP/IP, topology, and security), operating systems (Windows/UNIX), and web technologies (Internet security). Understand system data, including, but not limited to, security event logs, system logs, and firewall logs. Excellent written and verbal communication skills; must be able to communicate technical details clearly and concisely with peers and various levels of management team. Capability to think and operate independently or in a team environment with minimal supervision. A proactive, analytical and results driven mindset that is highly detail oriented. A solid understanding of process documentation and procedures with the ability to develop, revise and execute standard work. Organizational skills to manage multiple competing priorities and deadlines in a fast-paced working environment. Proven ability to troubleshoot and solve technical issues. Candidate should have technical understanding of the following areas: Network analysis using tcpdump, Wireshark or other packet capture/inspection tools. Searching, interpreting, and working with data from enterprise logging systems including syslog, netflow, Splunk or other SIEM/SIEM platforms. Endpoint protection suites such as Symantec, McAfee, Carbon Black, Forcepoint or Tanium.
Education: Typically requires a University Degree in Cyber, Computer Science, Computer Information Systems, Information and Technology Systems, Math or Science or related discipline or equivalent work experience or cybersecurity certifications in lieu of degree. Security+, Network+, A+, CySA+, GSEC, CEH, GCIH, GIAC or similar certifications are a plus.
Availability:
Ability to work 24/7/365 shift coverage (days, nights, weekends, holidays, or alternate non-traditional schedules as needed.