Required Skills

SOC analyst

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 13th Feb 2024

JOB DETAIL

·   Perform operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from SIEM monitoring tools, network and host-based intrusion detection systems, firewall logs, system logs (Unix & Windows). 

·   Responsible for responding to security incidents (malware infections, unauthorized access, malicious emails, DDoS attacks) and elevating to Threat Management team as needed. 

·   Analyze security event logs and alerts to determine validity, priority and impact against both security threat best practices and corporation policies. 

·   Evaluate the type, nature and severity of security events with a range of security event analysis tools. 

·   Conduct active and passive analysis of network traffic, operating systems, and host activity across all technologies and platforms, through security tools and sandbox environments. 

·   Perform incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts. 

·   High understanding of processes related to threat correlation and mitigation. 

·   Experience leading as an Incident Response Coordinator 

·   Documenting security investigations through standard procedures: 

o Recording full SOC Analyst response through remediation actions 

o Completing a security AAR 

o Completing a risk assessment as required 

·   Completion of security risk assessments 

·   Process assigned SOC queue tickets submitted by Crown Castle users and the IT Service Desk. 

·   Completion of weekly Social Media Report 

·   Additional Project Work as assigned. 

Education/Certifications  

·         Bachelor's degree in IT or Computer Security or comparable years’ experience. 

·         Must have at least one of the following certifications: CISSP, CCE, PMP, GSEC, CCNA Cyber Ops, CISF-GIAC Information Security Fundamentals, CISM, CRISC, Security+, CEH and GISF 

Experience/Minimum Requirements  

·         5+ years of experience in IT Security monitoring 

·         Tier 3 incident response experience 

·         Experience in SIEM event auditing, log review and incident response 

·         Windows and Linux System administration preferred. 

 Other Skills/Abilities  

·   Demonstrates a profound sense of ethics, integrity, and confidentiality 

·   Finds common ground and viable solutions to complex problems in a compelling manner while maintaining a professional composure 

·   Influences across a diverse discipline in a collaborative, risk aware manner 

·   Organized, responsible and highly thorough problem solver 

·   Proven ability to create and build new processes 

·   Great verbal and written communication skills and attention to detail 

·   Self-starter who can work independently as well as in a team setting 

·   Works well with people from different areas of the business 

·   Ability to simplify complex technical topics 

·   Ability to learn, understand, and apply new technologies 

·   Ability to design and implement effective policies to achieve consistent team results. 

·   Demonstrates a "learning agility" to remain current in subject matter expertise  

·   Experience documenting enterprise security events 

·   Navigate ambiguity; Is adaptable to, and champions change 

·   Giving and receiving effective feedback across all interactions 

Company Information