Enable job alerts via email!

Threat Monitoring and SOC Analyst

Spectraforce Technologies

Jacksonville (FL)

Remote

USD 80,000 - 100,000

Full time

Yesterday
Be an early applicant

Job summary

A cybersecurity solutions provider is seeking a Threat Monitoring and SOC Analyst to monitor and respond to cybersecurity threats. Candidates should have a Bachelor's degree in a related field and at least 3 years of cybersecurity experience. Responsibilities include monitoring security logs, analyzing threats, and creating security reports. This position is remote, offering flexibility in work arrangements.

Qualifications

  • 3+ years in a cybersecurity role, ideally in a SOC
  • Basic understanding of security controls
  • Experience with vulnerability and patch management

Responsibilities

  • Monitor security logs for threats
  • Perform threat analysis on alerts
  • Respond to cybersecurity reports and alerts
  • Create security reports for audits

Skills

Monitoring security event logs
Threat analysis
Correlating and analyzing threat data
Creating detailed security reports
Technical writing
Understanding security concepts

Education

Bachelor's degree in Computer Information Systems or Cybersecurity

Job description

Role: Threat Monitoring and SOC Analyst

Location: Remote

Duration: 6 months



Associate Cybersecurity Threat Analysts play a critical role in monitoring, detecting, and responding to cybersecurity threats in real-time. The Associate Cybersecurity Threat Analyst maintains and operates information security monitoring programs by applying security policies, processes, and standards for large and complex environments.



Key Responsibilities

  • Continuously monitor security event logs, network traffic, and system logs to identify potential security threats.

  • Performs comprehensive threat analysis of cyber alerts and events. Applies the appropriate mitigations and remediations in response to cybersecurity events and trends.

  • Respond to reports and alerts from cybersecurity detective and protective systems and tools.

  • Correlate and analyze threat data from various sources to establish the identity of malicious users or actors active in the computing environment.

  • Create detailed security reports to fulfill audit, management, or business requirements.

  • Conducts industry research and technical evaluation of threat intelligence from multiple sources with specific emphasis on actor Techniques, Tactics and Procedures (TTPs)

  • Participates in assessments and development of cyber threat profiles of current events based on collection, research, and analysis of open-source information

  • Assist with implementation or tuning of appropriate security controls and solutions to mitigate risk and vulnerabilities, as well as safeguard our systems and data.

  • Creates and coordinates completion of detailed security reports to fulfill audit, management or business owner requirements.

  • Contributes to the design, configuration, documentation, and implementation of security monitoring program.




Required Work Experience:

  • 3+ years of experience in a cybersecurity role, preferably in a Security Operations Center (SOC) environment.



  • Basic understanding of security concepts and controls for network, application, and operating systems.

  • Experience troubleshooting and investigating security related issues and having experience or knowledge with vulnerability and patch management.

  • Strong technical, analytical, and documenting and reviewing skills

  • Familiarity with cloud-based infrastructure and security tools, DevOps concepts, cloud security principles, risk management, and security best practices.

  • Familiarity with industry data security, privacy standards, and regulatory requirements.




Required Education: Related Bachelor's degree or additional related equivalent work experience - Computer Information Systems / Cybersecurity



Certifications: Certified in one of the following, or the ability to successfully obtain certification within 180 days of FTE conversion: Security+, GCIH*, CEH**, or GCFE (Forensics Analyst Only)



Preferred Work Experience:

* Basic knowledge of TCP/IP networking

* Experience or knowledge of scripting and automating information security systems



General Physical Demands

Sedentary work: Exerting up to 10 pounds of force occasionally to move objects. Jobs are sedentary if traversing activities are required only occasionally.

If Candidate one of the Certifications, please provide copy with resume or include certification # in template

Interview Comments: 1- Technical Panel interview- video required


Position is offered by a no fee agency.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.