HonorVet Technologies
Job Title - SOC Analyst
Req ID: 24-189482
Duration: 12+ Months
Location: New York City, NY
Onsite Role
Job Description The client is seeking a SOC Analyst to join their dynamic team. Schedule: Mon-Fri (11pm-7:30am)
Role Responsibilities:
Perform security monitoring and analysis leveraging SIEM and security tools Conduct technical analysis and correlation of operating system, database, application, cloud and network logs to triage potential security events and incident investigations Analyze tactics, techniques, and procedures (TTPs) for various intrusion sets Develop custom SIEM content and tune security tools to prevent, detect and respond to malicious activity Utilize EDR and network security tools to conduct host and network-based detection analysis Conduct vulnerability scans and participate in tabletop exercises Improve the incident response process through tabletop exercises, playbook development, and standard operating procedures Day to day, primarily first responder to incidents Requirements and Experience:
Must be a US Citizen Must be willing to come onsite to NYC on a regular basis Must have experience using various Threat Intelligence tools Experience managing ticket escalations, and incident response coordination across engineering, security, and management teams Experience in IDS/IPS, SIEM, EDR, DLP, Firewalls, DNS security, cloud security, Windows and Linux systems, etc. Familiarity with the Cybersecurity Framework (CSF) and a threat intelligence framework such as MITRE Telecommunication&CK Deep knowledge of threat and vulnerability analysis Extremely detail-oriented and ability to quickly investigate ongoing and emerging threats Experience in developing, acquiring, maintaining and implementing threat intelligence Strong computer knowledge (hardware & operating systems) Strong network knowledge Excellent communication skills (Phone/Email) Ability to interact and assist users over the phone Ability to communicate with confidence and ensure the highest level of professionalism. Ability to write clear emails to non-technical staff and send incident updates to upper management when required. Assist with weekly presentation slides and project updates Strong forensics background (soft requirement)
Job Description The client is seeking a SOC Analyst to join their dynamic team. Schedule: Mon-Fri (11pm-7:30am)
Role Responsibilities:
Perform security monitoring and analysis leveraging SIEM and security tools Conduct technical analysis and correlation of operating system, database, application, cloud and network logs to triage potential security events and incident investigations Analyze tactics, techniques, and procedures (TTPs) for various intrusion sets Develop custom SIEM content and tune security tools to prevent, detect and respond to malicious activity Utilize EDR and network security tools to conduct host and network-based detection analysis Conduct vulnerability scans and participate in tabletop exercises Improve the incident response process through tabletop exercises, playbook development, and standard operating procedures Day to day, primarily first responder to incidents Requirements and Experience:
Must be a US Citizen Must be willing to come onsite to NYC on a regular basis Must have experience using various Threat Intelligence tools Experience managing ticket escalations, and incident response coordination across engineering, security, and management teams Experience in IDS/IPS, SIEM, EDR, DLP, Firewalls, DNS security, cloud security, Windows and Linux systems, etc. Familiarity with the Cybersecurity Framework (CSF) and a threat intelligence framework such as MITRE Telecommunication&CK Deep knowledge of threat and vulnerability analysis Extremely detail-oriented and ability to quickly investigate ongoing and emerging threats Experience in developing, acquiring, maintaining and implementing threat intelligence Strong computer knowledge (hardware & operating systems) Strong network knowledge Excellent communication skills (Phone/Email) Ability to interact and assist users over the phone Ability to communicate with confidence and ensure the highest level of professionalism. Ability to write clear emails to non-technical staff and send incident updates to upper management when required. Assist with weekly presentation slides and project updates Strong forensics background (soft requirement)