SOC Analyst

  • Job Reference: N6030-671S
  • Date Posted: 27 April 2018
  • Location: Christchurch
  • Salary: On Application
  • Sector: Government & Defence, I.T. & Communications
  • Job Type: Permanent
  • Work Hours: Full Time
  • Contact: Sue Allen
  • Email: info@gregory-martin.com
  • Telephone: 01252 710215

Job Description

SOC Analyst

 

Our client is a highly successful international company they have an exciting opportunity for an IT Security SOC Analyst to join their business.  The role Supports the SOC by applying analytic and technical skills to monitor network security resources, investigate and resolve security incidents, identify malicious activity and potential insider threats, and coordinate incident response.

 

As an IT Security SOC Analyst your skills and qualifications will ideally include:

Team-oriented and skilled in working within a collaborative environment.

SOC or MSSP experience in an in-depth technical role.

Strong background with in-depth analysis of security events and the ability to triage security events

Experience with automated incident response tools (Sysmon, Carbon Black, etc.), packet capture and analysis (tcpdump/windump, Wireshark, etc.) and host and network forensics

SIEM experience – with knowledge of content creation (rules, alerts, etc.)

Familiarity with Carbon Black Response

Familiarity with LogRythm SIEM

Familiarity with Rapid 7 vulnerability tools

 

Core Competencies – SOC Analyst:

Technical expertise in Information and Network Security.

Strong understanding of security architectures and devices, threat intelligence consumption and management, malware infections and proactive mitigation, data exfiltration techniques.

Ability to work in fast paced environments, and ability to evenly manage workload even during times of stress or escalated activity.

 

As an IT Security SOC Analyst your main responsibilities will involve: 

Monitor security functions of applications related to Email security, Incident and event management, Endpoint management, DLP, Whitelisting,

Conduct intrusion prevention activities including log correlation, signature tuning, False positive reduction, eliminating or hardening attack planes,

Conducts event analysis determining cause of security events, analysis of packet capture, Log correlation.

Conduct Network and OS forensics, maintaining appropriate custodial status of evidence. 

Conduct incident response including resolving incident reports, coordinating the response and mitigation to incident, and change management follow through. 

 

SOC Analyst

Salary:  Competitive plus excellent benefits

Location:  Christchurch, Bournemouth, Dorset