JobHire logo
winking face

Register to automatically apply for this and similar jobs

Registration
quiz banner person

Is that really
your dream job?

Take our quiz NOW
and find out!
mouse cursor

SoC III Security Analyst

Transformation Lead

Atlanta, GA


Job Details

Contract


quiz banner person

Is that really
your dream job?

arrowTake our quiz NOW
and find out!
mouse cursor

Full Job Description

The SOC III Security Analyst has a passion for information security and is responsible for escalated analysis of information security events from various security platforms.  The analyst will be the primary resource responsible for the configuration, health and maintenance of various security monitoring solutions. The analyst will need a working knowledge of multiple network and host-based security solutions, such as intrusion detection systems, vulnerability assessment tools, and analysis of security log events. 

RESPONSIBILITIES

  • Effective configuration, monitoring and alerting of security events from multiple security platforms.  Technologies include intrusion detection and prevention, web proxies, firewalls, log events monitors (SEIM), antivirus, third party security service providers, and other network analysis tools.
  • Evaluates, recommends, and implements enhancements to security controls in network, application, and technology hosts (servers, endpoints, and other equipment) to ensure effectiveness and compliance with Bank standards.
  • Monitors emerging security industry trends, attack techniques, mitigation techniques, and security technologies by attending conferences, networking with peers, and other educational opportunities.  Recommends and implements suggestions for improving security based on research.
  • Works with team members on security projects, including implementation of new or upgraded technologies, engaging third parties for security services, deploying new reporting and monitoring tools, and strengthening/formalizing security processes both within the security team and with other supporting resources.
  • Primary resource for security operations function to review security alerts and ensures security tools are updated to provide notification to the security team of events requiring investigation.
  • Evaluate new vulnerability notification releases to identify potential risks to corporate environment.   Provides guidance of vulnerability remediation to the technology subject matter experts.
  • Ensure the network infrastructure and application development efforts meet security standards and industry best practices.
  • Monitoring the health of security devices and notification to Infrastructure leaders as necessary for malfunctioning equipment and software.
  • Utilize critical thinking and analytical skills for incident response research, analysis, communication, and management of forensic investigations.  Conducts incident investigations both during and after business hours, as needed.
  • Contributor to the maintenance, testing, and improvement of the Bank's security incident response plan.  Reviews security incidents to identify areas of strength and improvement to further enhance the process.
  • Partners closely with the Enterprise Architects, Project Managers, Infrastructure leaders, and Application Development teams to ensure a consistent approach to security solutions in each areas of responsibility. 
  • Provides management with security metrics for reporting to various levels at the Bank.

This description provides general information necessary to depict the essential and non-essential functions of the job and shall not be construed as a detailed description of all the required work that may be inherent in the job.

Requirements

  • Bachelor’s degree in computer science, information systems, or information security with five years of information security/information technology experience, including at least two years of information security experience, or the equivalent combination of education and experience is necessary.  Security certification such as CEH or GSEC is desired.
  • Technical understanding of security products such as firewalls, IDS/IPS, file integrity management systems, data loss prevention, security event monitoring, endpoint protection.
  • Experience writing custom intrusion detection signatures and SIEM log parsers.
  • Comprehensive level of core infrastructure and layered security experience, i.e., Windows, UNIX, Cisco IOS, TCP/IP, DNS, SMTP, SFTP, Active Directory, web security architecture, OSI stack, wireless networking technology, remote access.
  • Experience with threat intelligence collaboration and sharing of indicators of compromise.
  • Knowledge of scripting and software development skills are desired.
  • Foundational knowledge of popular enterprise database technologies and command usage.
  • Experience with identifying the behavior of modern exploits and malware including packet analysis of suspected activity.
  • Experience participating in red or blue team threat hunting exercises is highly desired.
  • Must have strong interpersonal skills, strong multi-tasking and analytical skills and attention to detail.
Source

Get 10x more interviews and get hired faster.

JobHire.AI is the first-ever AI-powered job search automation platform that finds and applies to relevant job openings until you're hired.

Registration