SOC Analyst Level III Responsibilities & Qualifications We are currently seeking an SOC Analyst to join our team. The chosen candidate for this position must have a love of diverse technologies and IT-related infrastructure.
Desired Technical Skills:
Handle security events: IDS alarm, malware (alerting, not triage), account misuse, network security events, etc.
Able to effectively weed out false positives and make decisions on triage steps.
Assist in creating new processes and automations for Level 1, 2 and 3 events.
Analyze risk alarms and events for customers.
Able to work in a fast-paced environment with service level agreements in place across clientele.
Understand and able to use a SIEM for event investigation.
Keep up on the latest security news and events, and effectively communicate them to team members.
A willingness to learn and enthusiasm about their future in security.
Experience with ethical hacking and be able to think like a hacker.
Develop and Update Playbooks (Procedures) for SOC Operations at the direction of the Directory of Cyber Security Operations.
Necessary Soft Skills:
Be the point person for Level I and Level II on threat intelligence, alarm investigation and industry news.
Ability to read and understand written English.
Ability to clearly communicate on the phone and through e-mail/ticket updates.
Ability to manage multiple tasks simultaneously and prioritize tasks appropriately.
Good customer service skills. Note: this job requires you to speak to clients throughout the day, please remember when applying