SOC Analyst L2

Cygilant

Cygilant

IT
Fort Lauderdale, FL, USA
Posted on Oct 10, 2024

Thanks for the click. We know your time is valuable so we will get right to it.

We’ve amassed some of the best and brightest minds in cyber security who are passionate about protecting the digital world. Our team blends advanced technology alongside deep expertise to tackle the toughest cyber threats out there. Put simply, our mission is to stay ahead of the curve and create a safer digital landscape for our partners, and we believe adding a SOC Analyst L2 will up our cyber game.

The SOC Analyst L2 is the primary escalation point for technical issues involving SOC services. Assists the SOC Manager in managing the team’s operations which includes proper escalations, assigning and handling of relevant CSS tickets, coaching and training of analysts, and managing the team in the absence of the SOC Manager and Team Lead. This position also conducts research on latest information regarding vulnerabilities and attacks.

What you’ll be doing:

  • Monitoring and analyzing Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for remediation/suppression.
  • Assisting in Computer Security Incident Response activities for large organizations as a 1st line security analyst to identify various malicious threats in enterprise environments.
  • Ensuring timely accurate communications of alerts to IT, Network or Security groups regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
  • Although not directly accountable for changes to policy and guidelines, you will be required to make recommendations to improve operational effectiveness and efficiency.
  • Working on client support services tickets and respond to security and soc-related questions raised by clients.
  • Acting as the first line escalation point for all technical and customer issues.
  • Escalating information, concerns, and problems to all concerned.
  • Supervising SOC process (operations and monitoring) and members in the absence of SOC Manager and Team Lead.
  • Providing coaching and trainings to analysts.
  • Submitting rules, correlations and other mechanisms for detecting malicious traffic.
  • Acting as SME for SOC services and managed tools.

What does it take to succeed in this role?

  • Excellent customer service skills.
  • Strong analytical and problem-solving skills; research skills.
  • Good communication skills, coaching skills.
  • With understanding of basic networking principles, TCP/IP, IP addressing, etc.
  • Understanding of common network services (web, mail, FTP, etc), network vulnerabilities, and network attack patterns.
  • Willing to work in flexible schedules.
  • At least 1-2 years of direct SOC experience.
  • Broad experience of technologies including but not limited to; Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, TCP/IP, Networks, AWS, CDN's, Vulnerability management and SIEM, DRM, Microsoft Sentinel, and Sentinel One.
  • At least basic knowledge the fundamentals of cyber security.
    • Security Administration
    • Incident containment, recovery, and mitigation
  • With Information Security Technology focused degree or other related courses, preferably with Certification in Sec+ (Certifications can include any vendor certifications or general network security certification.) In lieu of degree, equivalent SOC experience would be considered.
  • Knowledge of firewalls and intrusion detection systems (specific knowledge of any of the following IDS/IPS is considered a plus: Cisco, Snort, Fortinet) or Linux/Windows System Administration.
  • Knowledge and experience in IT Security (Physical, hardware and software).
  • Experience with SIEM or Service Desk toolsets.
  • Evidence of working to SLAs within a Security Operations Centre.
  • Previous experience of working within a shift-based structure as part of a 24x7x365 service delivery environment is advantageous.

What are the desirables?

  • Experience with security assessment tools (NMAP, ISS, NESSUS) is preferred.
  • Relevant security certifications including SSCP, CEH, Security+, CySa+, GCIH.

In addition to the technical expertise, we expect respect, opinions, and thoughtful input.

If this sounds interesting and you are passionate about redefining how the world thinks about cyber security, we want to hear from you. Apply now if you are interested in learning more about how we can change the rules of engagement, together.

About SilverSky

We are a global cyber security company with more than 20 years of professional experience in the industry. Our 300+ employees are on a mission to protect our customers with comprehensive, adaptive security services that maximize technology and automate responses, while empowering security analysts to hunt for threats, react and respond immediately. It’s the human enhanced response that differentiates SilverSky and allows us to create the most comprehensive managed detection and response (MxDR) solution in the industry by delivering on our Vision, Velocity, Vigilance philosophy. Follow us on LinkedIn and X.