Job Title: SOC Analyst – T1 / T2
Working Hours: Fulltime Graveyard Shift (WFH Set Up)
SUMMARY:
This role is pivotal in supporting and enhancing Client’s Security Operations Center (SOC). As a SOC Analyst, the focus is on three key areas:
(1) being the primary entry point for all security alerts, responsible for triaging and ensuring effective alert management,
(2) actively contributing to the operational effectiveness of the SOC
within Client’s managed security services framework;
(3) playing a critical role in the analysis and resolution
of security alerts, escalations and incidents, working collaboratively with Client Operations teams.
ESSENTIAL RESPONSIBILITIES:
Alert Triage: Acts as the first point of contact for all incoming security alerts from various sources, including SIEM, IDS/IPS, and other security tools. Responsibilities include initial assessment, categorization, and prioritization of alerts based on severity and potential impact.
Incident Response Support: Perform initial investigations on security alerts to determine the root cause and potential impact. Escalate alerts, events, and incidents to the appropriate teams for further analysis and remediation.
Process Enhancement: Participates in evaluating and enhancing alert management processes, ensuring efficient and effective triage procedures.
Security Tools Operation: Involved in the basic operation and configuration of security tools like the Client Security Platform, focusing on alert management and response capabilities.
Learning and Development: Actively engages in training programs to improve alert triaging skills and overall SOC knowledge. Stay current on emerging security threats, vulnerabilities, and best practices with active commitment to professional development.
Reporting and Documentation: Assists in documenting alert activities and contributes to SOC performance reports, focusing on triage effectiveness and alert resolution.
Collaborative Teamwork: Works closely with the SOC team, providing insights and support to enhance team-wide alert management capabilities.
REQUIRED EXPERIENCE:
-Bachelor’s degree in computer science, information technology, or a related field.
-2-4 years in cybersecurity roles within a Security Operations Center (SOC)
-Experience in handling and triaging security alerts.
-Familiarity with MITRE ATT&CK Framework.
-Familiarity with security frameworks and standards such as NIST 800-53, CIS Top 20, etc.
-Understanding of cloud technologies (AWS, Azure, etc.) and security fundamentals.
-Knowledge of networking and infrastructure basics.
-Tools and Technologies:
-Basic proficiency in SIEM systems.
-Exposure to IDP, EDR, and NDR tools.
-Familiarity with network analysis tools like Wireshark or tcpdump.
-Introductory scripting skills in Python, Bash, or PowerShell.
-Strong organizational and time management skills.
-Strong analytical and problem-solving skills.
-Ability to work independently and as part of a team.
-Excellent communication skills, both written and verbal.
-Ability to prioritize and manage multiple tasks and projects.
OTHER REQUIREMENTS:
T1 or T2 title will be dependent on experience.
-Flexibility of schedule is required to meet the demands of the position.
-This role will be required to work nights and weekends in rotating shifts to provide 24x7x365 coverage.
PREFERRED CERTIFICATIONS:
One or more of the following certifications are preferred.
• CompTIA – Security
• GSEC – SANS GIAC Security Essentials
• SSCP – Systems Security Certified Practitioner
To APPLY,
To APPLY, kindly send your most Updated Resume to
APPLY FOR THIS JOB:
Company: BEST MARKETING AGENCY PTE LTD
Name: Gabtech Recruitment Team
Email: