Enable job alerts via email!

SOC Analyst

Nesco Resource

Jersey City (NJ)

On-site

USD 80,000 - 110,000

Full time

13 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative firm is seeking a skilled SOC Analyst to enhance their Security Operations Center. This role involves monitoring and analyzing security incidents across various domains, including Network, Cloud, and IoT. The ideal candidate will be proactive, possess strong technical skills, and adapt to emerging threats. Responsibilities include incident response, threat intelligence analysis, and ensuring compliance with security standards. Join this dynamic environment and contribute to protecting critical information assets while working with cutting-edge technologies and methodologies in cybersecurity.

Benefits

Medical Insurance
Dental Insurance
Vision Insurance
401K
Employee Assistance Program

Qualifications

  • 3+ years of experience in a SOC or equivalent security operations role.
  • Strong knowledge of security tools and incident response methodologies.
  • Proven ability to analyze threats and respond effectively.

Responsibilities

  • Monitor security tools and respond to incidents promptly.
  • Conduct threat analysis and maintain knowledge of attack techniques.
  • Collaborate with teams for forensic analysis and reporting.

Skills

SIEM platforms
EDR solutions
Cloud security (AWS, Azure)
DevSecOps practices
Network protocols
IAM principles
Vulnerability management
Compliance standards
Analytical skills
Communication skills

Education

Bachelor's Degree in Cybersecurity
CompTIA Security
CISSP
GSEC
AWS Certified Security Specialty

Tools

Sentinel
CrowdStrike
Jenkins
GitHub
Kubernetes
Nessus
Metasploit

Job description

Position Overview

Our client is seeking a versatile and highly skilled SOC Analyst to join our Security Operations Center (SOC). This role requires an individual who can effectively monitor, analyze, and respond to security incidents across multiple domains, including Network, Application, Cloud, DevSecOps, Endpoint, IoT, IAM, Incident Response, Threat Intelligence, Compliance and Risk, and Data Security. The ideal candidate will possess a strong technical background, a proactive mindset, and the ability to adapt to emerging threats in a dynamic security landscape.

Key Responsibilities
  1. Monitoring and Incident Response
  2. Continuously monitor security tools, logs, and alerts for potential security incidents.
  3. Respond to and investigate security alerts, ensuring quick containment and remediation.
  4. Collaborate with incident response teams to perform forensic analysis and root cause investigations.
  5. Work with MTDR vendor on SIEM configuration and requirements.
Threat Intelligence and Analysis
  1. Analyze and interpret threat intelligence feeds to identify emerging threats.
  2. Conduct proactive threat hunting across systems, networks, and applications.
  3. Maintain up-to-date knowledge of current attack techniques, tactics, and procedures (TTPs).
  4. Leverage MITRE Telecommunication & CK Matrix to identify and map adversary tactics and techniques during threat investigations, enabling faster detection and response.
Network and Endpoint Security
  1. Monitor and secure network infrastructure, including firewalls, intrusion detection/prevention systems (IDS/IPS), and VPNs.
  2. Manage and monitor endpoint detection and response (EDR) tools to ensure device security.
Application and Cloud Security
  1. Perform security assessments on applications, APIs, and cloud environments.
  2. Ensure security controls are implemented and maintained in cloud platforms (AWS, Azure, Google Cloud).
  3. Collaborate with DevSecOps teams to automate security checks in CI/CD pipelines.
  4. Leverage OWASP and CSA to identify and mitigate application security risks and ensure cloud security best practices during threat analysis and remediation.
IAM and Data Security
  1. Monitor identity and access management (IAM) systems for suspicious activities and unauthorized access.
  2. Ensure sensitive data is protected through encryption, data loss prevention (DLP), and secure storage.
IoT Security
  1. Assess and secure Internet of Things (IoT) devices and networks.
  2. Implement protocols for secure IoT device management and monitoring.
Compliance and Risk Management
  1. Assist with audits and compliance checks for frameworks such as GDPR, HIPAA, ISO 27001, or NIST.
  2. Provide recommendations for reducing security risks and improving overall compliance posture.
  3. Perform internal audits to ensure controls are operating as expected.
Reporting and Communication
  1. Generate detailed reports on incidents, threats, and remediation actions for technical and non-technical stakeholders.
  2. Communicate effectively with cross-functional teams, including IT, development, and management.
Required Skills and Qualifications
Technical Skills
  • Knowledge of SIEM platforms (e.g., Sentinel, AlienVault, etc.).
  • Familiarity with EDR solutions (e.g., CrowdStrike, SentinelOne).
  • Proficiency in securing cloud environments (AWS, Azure).
  • Experience with DevSecOps practices and tools (e.g., Jenkins, GitHub, Kubernetes).
  • Understanding of network protocols (TCP/IP, DNS, HTTP) and security tools (firewalls, IDS/IPS).
  • Knowledge of IAM principles and tools (e.g., Okta, Azure AD).
  • Experience with vulnerability management and penetration testing tools (e.g., Nessus, Metasploit).
  • Familiarity with compliance standards (e.g., GDPR, HIPAA, PCI DSS).
Soft Skills
  • Strong analytical and problem-solving abilities.
  • Excellent verbal and written communication skills.
  • Ability to work collaboratively in a fast-paced environment.
  • Proactive and self-motivated with a keen attention to detail.
Education and Experience
  • Bachelor's Degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).
  • Certifications (preferred):
    • CompTIA Security , CEH, CISSP, GSEC, or equivalent.
    • AWS Certified Security Specialty or Azure Security Engineer Associate.
    • Certified Incident Handler (GCIH) or Certified Threat Intelligence Analyst (CTIA).
  • 3 years of experience in a SOC or equivalent security operations role.

Nesco Resource offers a comprehensive benefits package for our associates, which includes a MEC (Minimum Essential Coverage) plan that encompasses Medical, Vision, Dental, 401K, and EAP (Employee Assistance Program) services.

Nesco Resource provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Senior Associate Incident & Threat Analyst (SOC Analyst)

Discover Financial Services, Inc.

Remote

USD 67,000 - 113,000

Yesterday
Be an early applicant

SOC Analyst (m/w/d)

IT Security GmbH

South Carolina

Remote

USD 80,000 - 100,000

16 days ago

OT SOC Analyst I

ABS Group

Houston

Remote

USD 50,000 - 90,000

25 days ago

Senior SOC Analyst

Alight Solutions

Remote

USD 80,000 - 120,000

6 days ago
Be an early applicant

SOC Analyst

Alight Solutions

Remote

USD 72,000 - 115,000

30+ days ago

SOC Analyst

Arena Technical Resources, LLC (ATR)

Washington

Remote

USD 70,000 - 110,000

30+ days ago

Senior SOC Analyst

Peterson Technology Partners

Chicago

Remote

USD 80,000 - 120,000

8 days ago

Senior OT SOC Analyst

Capgemini

New Jersey

On-site

USD 80,000 - 120,000

9 days ago

Senior OT SOC Analyst

Capgemini

New Jersey

On-site

USD 80,000 - 120,000

9 days ago