Job Description
We're excited to invite applicants for the SOC Security Analyst (Level 2) position! While we prefer candidates who can work in a hybrid setting from College Park, Maryland, we are open to considering remote candidates located within the U.S. The role follows a unique Panama schedule with four teams operating two 12-hour shifts to provide continuous 24/7 coverage. The schedule consists of 2 days on, 2 days off, 3 days on, 2 days off, 2 days on, and 3 days off.
About the Role
As a SOC Security Analyst (Level 2), you will play a crucial role in assisting our global customers in managing their IT security. You'll be part of a dynamic team dedicated to minimizing the impact of security incidents and ensuring that critical business operations run smoothly.
Key Responsibilities
- Monitoring & Analysis: Track and analyze security events and alerts from various sources, including SIEM software, intrusion detection systems, firewall logs, and system logs (Windows and Unix).
- Threat Identification: Differentiate genuine threats from false positives through network and log analysis, escalating any suspected intrusions or attacks as needed.
- Ticket Management: Initiate and document tickets, escalating them to higher-level security analysts when necessary.
- Mentorship: Act as a technical escalation point and mentor for junior analysts, fostering their professional growth.
- Communication: Regularly engage with customer IT teams to provide updates on issues, assist with remediation efforts, and ensure uninterrupted business operations.
- Triage: Assess incoming issues to prioritize and determine risk levels.
- Customer Collaboration: Work with customers to implement monitoring systems and maintain awareness of the evolving threat landscape.
Basic Qualifications
- Strong teamwork and collaboration skills.
- Knowledge of intrusion detection/prevention systems and SIEM software.
- Familiarity with network protocols and devices.
- Proficient in Mac OS, Windows, and Unix systems.
- Ability to analyze event logs and identify signs of cyber intrusions.
- Skilled in managing high-pressure situations with professionalism and productivity.
- Excellent written and verbal communication skills, with the ability to convey complex technical concepts clearly.
- Comfortable working in a 24/7 environment, including nights and weekends, on a rotating shift schedule.
- Familiarity with security tools such as Wireshark, TCP Dump, Security Onion, and Splunk.
Preferred Qualifications
- 2-4 years of hands-on experience in SOC, TOC, or NOC environments.
- Relevant certifications such as GCIA (required), GCIH, GCFE, CISSP, Security+, Network+, CEH, RHCA, RHCE, MCSA, MCP, or MCSE (preferred).
- Experience with tools like IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus.
- Understanding of programming/scripting languages and ability to run basic database queries.
Education
- A minimum of a bachelor's degree in Information Security, Computer Science, or a related IT field. We also welcome exceptional candidates with proven experience in security or network operations.
Why Join Us?
We believe that effective cybersecurity is essential for our clients and their supply chains. Our dedicated team comprises experts who leverage advanced data, analytics, and technology to secure their ecosystems. Join us in making a significant impact on cybersecurity and help protect what matters most.
Employment Type: Full-Time
Salary: $ 40,000.00 140,000.00 Per Year
Job Tags
Full time, Remote job, Shift work, Rotating shift, Weekend work,