Position Summary/Purpose:
The SOC (Security Operations Center) Analyst within IT Security, serves as the tip of the spear for Security Operations, by triaging alerts and identifying potential attacks to escalate to Incident Response (IR). They will also serve as the interim IR first line of defense until an IR expert or Engineer is on the line and able to assist, up to and including the authority to contain and isolate a potential attack. Finally, an effective SOC Analyst is deeply knowledgeable about security intelligence and is able to respond to a wide range of security alert sources using tools such as SIEM, SOAR and NDR – able to create searches, correlations and detections.
Primary Responsibilities /Accountabilities/ Essential Functions:
1. Respond to alerts, triage potential incidents and escalate or resolve as appropriate.
2. Understand the basics of key security controls including WAF, NGFW, NGAV, EDR, CASB, IAM, UEBA, DLP, NDR, UEM and SIEM and how to respond to incidents from these technology platforms.
3. Communicate alerts regarding intrusion and compromise attempts against the network infrastructure, applications, and operating systems along the escalation path to IR and Engineering or to Management as appropriate.
4. Coordinate with end-users and business contacts to help triage and resolve issues.
5. Other duties as assigned.
Equipment Used and Responsibility
Supervisory Responsibilities
Informal mentorship.
Experience/ Education
Physical Requirements: