SEDC is looking for a SOC ANALYST to join our Managed Security Services team at our Atlanta, GA headquarters. Were looking for someone with strong track record of success with a comittment to excellence.
Job Summary: As a SOC ANALYST you'll be responsible for executing accurate real-time analysis and correlation of logs/alerts from a multitude of client devices with a focus on the determination of whether said events constitute security incidents. A main component of the role will handle clients' requests and questions received via phone, e-mail, or an internal ticketing system in a timely and detail-oriented fashion in order to resolve a multitude of information security related situations.
Roles & Responsibilities Perform accurate real-time analysis and correlation of logs/alerts from a multitude of client devices with a focus on the determination of whether said events constitute security incidents Analyze and assess security incidents and escalate to client resources or appropriate internal teams for additional assistance Manage all customer situations in a professional manner with emphasis on customer satisfaction Handle clients' requests and questions received via phone, e-mail, or an internal ticketing system in a timely and detail-oriented fashion in order to resolve a multitude of information security related situations Install, configure, and troubleshoot network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote The position will be night shift role on 12 hour shifts working 36 hours in week one and 48 hours in week two intervals.
Minimum Qualifications: Bachelors degree or Significant theoretical and practical knowledge in the following areas: Experience managing operations or projects in a SOC Experience performing analysis of security events to determine root cause and provide resolution Working knowledge of security tools such as firewalls, IDS/IPS, NGAV/EDR (Carbon Black preferred), web filtering, server and network device hardening, SIEM (AlienVault preferred) Ability to understand and follow incident response procedures Linux and Windows based operating systems Well-known networking protocols and services (FTP, HTTP, SSH, SMB, LDAP, etc.) Attention to detail and great organizational skills to exploit, vulnerabilities, network attacks Packet analysis tools (tcpdump, Wireshark, ngrep, etc.) Database structures and queries Strong written and verbal communication skills Excellent problem solving skills Ability to work alone and in a team environment Associated topics: cybersecurity, forensic, identity, iam, information assurance, malicious, security analyst, security engineer, security officer, violation