Vaughan
On-site
CAD 60,000 - 100,000
Full time
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
Job summary
An established industry player is seeking a dedicated Security Operations Center Analyst to ensure the safety and security of their digital assets. In this role, you will engage in real-time monitoring of security events, conduct thorough analyses, and respond to incidents effectively. Your expertise in SIEM technologies and incident response will be crucial as you work to protect the organization from evolving threats. Join a dynamic team where your contributions will help shape the future of cybersecurity and make a tangible impact in a rapidly changing landscape.
Qualifications
- 2+ years of experience in a SOC environment focusing on incident detection and response.
- Hands-on experience with SIEM and EDR technologies, including Microsoft Sentinel.
Responsibilities
- Conduct real-time monitoring of security events and perform triage of potential threats.
- Analyze security alerts and validate incidents using established playbooks.
Skills
Incident Detection and Response
Malware Analysis
Security Event Monitoring
Communication Skills
Education
Industry-relevant Certifications (CISSP, CISM, etc.)
Tools
Microsoft Sentinel
SIEM Technologies
EDR/XDR Technologies
Microsoft Defender Endpoint
Job Description
Responsibilities:
- Conduct real-time, continuous 'eyes-on-glass' monitoring of security events, responses, and reporting.
- Acknowledge tickets in ITSM according to defined service level agreements.
- Perform security event triage and validate potential threats following standard processes and procedures.
- Analyze, contextualize, and monitor security alerts from various advanced security platforms.
- Utilize internal and external data sources to research and enrich event information, determining if an event warrants classification as an "incident."
- Validate IOCs, investigate intrusion attempts, and conduct in-depth analysis and correlation of host-based logs, network traffic, and other data sources.
- Conduct continuous monitoring of event logs, evaluating, analyzing, and correlating triggers based on established Threat Use Cases.
- Diagnose events using identification playbooks to discern false positives or duplicates.
- Execute daily tasks including ticket review, investigating security events effectively, communicating findings, and escalating concerns to senior staff and/or SOC Manager as needed, per the established playbooks and SOPs (Standard Operating Procedures).
- Identify and prioritize incidents based on organizational impact or threat severity.
Qualifications:
- 2+ years of experience in a SOC environment in incident detection and response, remediation, malware analysis, or Incident Response / forensics.
- Hands-on experience with Microsoft Sentinel or other SIEM and EDR/XDR technologies, creating and running queries, and performing analytics, examination of logs and console events.
- Exposure to Microsoft Defender Endpoint, CSPM/CWP, or similar technologies.
- Experience in Web Application Firewalls and API security.
- Knowledge or experience in cloud security (Azure).
- Good understanding of SANS and MITRE Telecommunication & CCK Frameworks.
- Any industry-relevant certifications such as CISSP, CISM, SANS, CISA, CompTIA Security+ or CySA+, GIAC are assets.
- Strong understanding of business processes and ability to manage change and adhere to change management processes.
- Excellent communication skills.
Nice to Have:
- Knowledge or experience in cloud security (GCP or AWS).
- Experience in malware analysis and reverse engineering.