Job Specifications
Thanks for the click. We know your time is valuable so we will get right to it.
We've amassed some of the best and brightest minds in cyber security who are passionate about protecting the digital world. Our team blends advanced technology alongside deep expertise to tackle the toughest cyber threats out there. Put simply, our mission is to stay ahead of the curve and create a safer digital landscape for our partners, and we believe adding a SOC Analyst L2 will up our cyber game.
The SOC Analyst L2 is the primary escalation point for technical issues involving SOC services. Assists the SOC Manager in managing the team's operations which includes proper escalations, assigning and handling of relevant CSS tickets, coaching and training of analysts, and managing the team in the absence of the SOC Manager and Team Lead. This position also conducts research on latest information regarding vulnerabilities and attacks.
What you'll be doing:
Monitoring and analyzing Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for remediation/suppression.
Assisting in Computer Security Incident Response activities for large organizations as a 1st line security analyst to identify various malicious threats in enterprise environments.
Ensuring timely accurate communications of alerts to IT, Network or Security groups regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
Although not directly accountable for changes to policy and guidelines, you will be required to make recommendations to improve operational effectiveness and efficiency.
Working on client support services tickets and respond to security and soc-related questions raised by clients.
Acting as the first line escalation point for all technical and customer issues.
Escalating information, concerns, and problems to all concerned.
Supervising SOC process (operations and monitoring) and members in the absence of SOC Manager and Team Lead.
Providing coaching and trainings to analysts.
Submitting rules, correlations and other mechanisms for detecting malicious traffic.
Acting as SME for SOC services and managed tools.
What does it take to succeed in this role?
Excellent customer service skills.
Strong analytical and problem-solving skills; research skills.
Good communication skills, coaching skills.
With understanding of basic networking principles, TCP/IP, IP addressing, etc.
Understanding of common network services (web, mail, FTP, etc), network vulnerabilities, and network attack patterns.
Willing to work in flexible schedules.
At least 1-2 years of direct SOC experience.
Broad experience of technologies including but not limited to; Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, TCP/IP, Networks, AWS, CDN's, Vulnerability management and SIEM, DRM, Microsoft Sentinel, and Sentinel One.
At least basic knowledge the fundamentals of cyber security.
Security Administration
Incident containment, recovery, and mitigation
With Information Security Technology focused degree or other related courses, preferably with Certification in Sec+ (Certifications can include any vendor certifications or general network security certification.) In lieu of degree, equivalent SOC experience would be considered.
Knowledge of firewalls and intrusion detection systems (specific knowledge of any of the following IDS/IPS is considered a plus: Cisco, Snort, Fortinet) or Linux/Windows System Administration.
Knowledge and experience in IT Security (Physical, hardware and software).
Experience with SIEM or Service Desk toolsets.
Evidence of working to SLAs within a Security Operations Centre.
Previous experience of working within a shift-based structure as part of a 24x7x365 service delivery environment is advantageous.
What are the desirables?
Experience with security assessment tools (NMAP, ISS, NESSUS) is preferred.
Relevant security certifications including SSCP, CEH, Security+, CySa+, GCIH.
How we work?
Our 3 values define how we operate internally as well as externally:
Vision - We embrace a forward-thinking mindset. Our team has a clear and inspiring picture of the future that helps drive our decisions towards creating and delivering world-class security services.
Velocity - We have a bias for action. We move swiftly and with purpose toward our goals and objectives and can easily adapt (and adjust) along the way.
Vigilance - We foster a culture of proactive awareness for our company and our customers, who trust us to be an extension of their team. We are always looking for areas where we can innovate, improve, fix, transform and revolutionize, which ensures the protection, safety and success of everyone at SilverSky.
Individuals that can act intelligently and confidently without an ego will thrive.
In addition to the technical expertise, we expect respect, opinions,
About the Company
Today’s organizations are playing catch-up, chasing alerts with a scarcity of experienced people, time and budget. It’s time to change the rules of engagement with SilverSky, the world’s leading Managed Detection and Response platform for threat detection, log management and response.
SilverSky gives our customers enhanced Vision, Velocity and Vigilance.
The Vision to be an advanced technology company, developing the depth and complexity of analysis to shield them from cyber risk, regardless of their size or journey....
Know more