Tier 2 SOC Analyst

Posted: 4/14/2020 

Job Description

Location and Working Hours

  1. The T2 will be located at the customer site and will work morning shifts only
  2. Occasionally the T2 analyst maybe required to work night shifts

 

Job Duties

  1. Validating incident tickets raised by the T1
  2. Providing incident response recommendations to the customer based on the type of incidents with a periodic follow up as per defined SLA
  3. Analyzing malware samples captured by the SOC
  4. Writing SIEM use cases based on the customer environment
  5. Writing QRadar DSMs or ArcSight Flex Connectors to integrate new log sources
  6. Performing Threat research, gathering IOCs and TTPs
  7. Producing Threat reports and vulnerability advisories
  8. Writing SOC reports
  9. Mentor and develop T1 analysts

 

Required Skills

  1. Solid networking, systems and security background
  2. Solid understanding of attacker tactics, techniques and procedures
  3. Solid familiarity and hands on experience with different security products
  4. Solid understanding of SIEM technology, preferably one of IBM Q-Radar, Micro Focus ArcSight or LogRhythm
  5. Solid scripting skills using Python

 

Personal Traits

  1. Team player
  2. Solid writing skills
  3. Solid analytical skills
  4. Solid research skills
  5. Ability to work unsupervised and independently

 

Apply Now