Tential
Security SOC Analyst
Tential, Rockville, Maryland, us, 20849
Position Overview:
We are seeking a Security SOC (Security Operations Center) Analyst (aka SecOps Analyst) to join our dynamic cybersecurity team. The Security Operations Center is a (24x7x365) function, and the SecOps Analyst will need to be flexible to cover whatever shift is required.
As a SecOps Analyst, you will be responsible for monitoring and responding to security alerts, analyzing security event details, assisting in identifying potential vulnerabilities within the organization's infrastructure, supporting incident response and forensics analysis, and supporting security operational tasks such as network configuration changes. This role offers an excellent opportunity to develop your skills in cybersecurity, threat detection, and incident response in a fast-paced and supportive environment. The analyst should have a strong desire to learn and grow within the cybersecurity field.
Key Responsibilities: •Security Monitoring & Incident Detection: o Continuously monitor security alerts from various security tools (SIEM, IDS/IPS, firewalls, endpoint protection). o Identify and analyze potential security threats, incidents, and anomalies. o Escalate identified incidents to senior analysts or the incident response team, if necessary. •Incident Triage & Analysis: o Perform initial analysis and triage of security incidents, categorizing and prioritizing threats based on severity. o Collect and review relevant logs, evidence, and data to assess the impact of potential security incidents. o Assist in the creation of incident reports and documentation. •Threat Intelligence & Research: o Stay updated on the latest cybersecurity threats, vulnerabilities, and attack trends. o Assist in the implementation of threat intelligence feeds and integrate them into the monitoring systems. o Participate in investigations and research related to emerging security threats. •Security Tools Management: o Assist in configuring and tuning security tools to reduce false positives and improve alert accuracy. •Collaboration & Reporting: o Collaborate with senior SOC analysts, IT teams, and other departments to ensure comprehensive security coverage. o Contribute to daily, weekly, and monthly security status reports and dashboards. o Participate in post-incident reviews to identify lessons learned and improve response strategies.
Required Qualifications: •Bachelor's degree in computer science, Information Security, or a related field (or equivalent work experience). •Basic understanding of network protocols, operating systems, and cybersecurity principles. •Experience with common security tools such as SIEM (e.g., Splunk, ArcSight), IDS/IPS, firewalls, endpoint protection, and antivirus solutions. •Understanding of common attack vectors (e.g., phishing, malware, DDoS) and defense mechanisms. •Ability to analyze logs, network traffic, and system activity to identify potential threats.
Preferred Qualifications: •Knowledge of security frameworks such as NIST, CIS, or ISO 27001. •Certifications such as CompTIA Security+, Cisco CCNA Security, or other cybersecurity-related certifications are a plus. •Strong analytical and problem-solving skills, with attention to detail. •Good communication skills and the ability to work well in a team environment.
#Dice #LI-WB
As a SecOps Analyst, you will be responsible for monitoring and responding to security alerts, analyzing security event details, assisting in identifying potential vulnerabilities within the organization's infrastructure, supporting incident response and forensics analysis, and supporting security operational tasks such as network configuration changes. This role offers an excellent opportunity to develop your skills in cybersecurity, threat detection, and incident response in a fast-paced and supportive environment. The analyst should have a strong desire to learn and grow within the cybersecurity field.
Key Responsibilities: •Security Monitoring & Incident Detection: o Continuously monitor security alerts from various security tools (SIEM, IDS/IPS, firewalls, endpoint protection). o Identify and analyze potential security threats, incidents, and anomalies. o Escalate identified incidents to senior analysts or the incident response team, if necessary. •Incident Triage & Analysis: o Perform initial analysis and triage of security incidents, categorizing and prioritizing threats based on severity. o Collect and review relevant logs, evidence, and data to assess the impact of potential security incidents. o Assist in the creation of incident reports and documentation. •Threat Intelligence & Research: o Stay updated on the latest cybersecurity threats, vulnerabilities, and attack trends. o Assist in the implementation of threat intelligence feeds and integrate them into the monitoring systems. o Participate in investigations and research related to emerging security threats. •Security Tools Management: o Assist in configuring and tuning security tools to reduce false positives and improve alert accuracy. •Collaboration & Reporting: o Collaborate with senior SOC analysts, IT teams, and other departments to ensure comprehensive security coverage. o Contribute to daily, weekly, and monthly security status reports and dashboards. o Participate in post-incident reviews to identify lessons learned and improve response strategies.
Required Qualifications: •Bachelor's degree in computer science, Information Security, or a related field (or equivalent work experience). •Basic understanding of network protocols, operating systems, and cybersecurity principles. •Experience with common security tools such as SIEM (e.g., Splunk, ArcSight), IDS/IPS, firewalls, endpoint protection, and antivirus solutions. •Understanding of common attack vectors (e.g., phishing, malware, DDoS) and defense mechanisms. •Ability to analyze logs, network traffic, and system activity to identify potential threats.
Preferred Qualifications: •Knowledge of security frameworks such as NIST, CIS, or ISO 27001. •Certifications such as CompTIA Security+, Cisco CCNA Security, or other cybersecurity-related certifications are a plus. •Strong analytical and problem-solving skills, with attention to detail. •Good communication skills and the ability to work well in a team environment.
#Dice #LI-WB