Back to Job Search

Senior SOC Analyst

  • Location: Columbia, SC, 29210
  • Salary: 60.0
  • Job Type:Contract

Posted 26 days ago

Terrific Contract Opportunity!

Position:  Senior SOC Analyst
Location: Columbia, SC 29210
Term: 12 Months Contract to hire


Day-to-Day Responsibilities:
 

  • Provide managed security operations center (SOC) analysis associated with customer monitoring activities through the processing and management of incident and request tickets, as they are assigned
  • Deeper dives into threat hunting are also in scope
  • Receiving and managing escalations from other Analysts, customers, and other internal groups, as well as managing the full incident handling lifecycle with customers
  • Contribute to internal documentation and adherence to SLA targets and requirements
  • Maintain Industry Training – This involves keeping up-to-date on security technologies, threats, and risk mitigation techniques
  • Maintain Knowledge of Current Threats – Keep up-to-date on current threats by regularly reading industry-related articles
  • Enhance vSOC with advanced skill sets such as SOC automation and orchestration to optimize SOC resource allocation
  • Case Management – ensuring the case management process is handled efficiently in a timely manner by all SOC personnel.
  • SOC Activity Log –creating, reviewing, and maintaining entries, working with other analysts Report Creation – creating temporary or permanent reports for customers, as requested.
  • Customer Meetings – attending and/or leading customer meetings as part of incident response and incident handling
  • Training and Mentoring SOC personnel – Security Analysts are responsible for training new SOC employees; also responsible for training and mentoring existing SOC personnel on new technologies implemented by CenturyLink; also responsible for retraining SOC personnel, if necessary
  • Tuning – regularly performing tuning and filtering SIEM alerts and monitoring components to ensure only relevant security data is gathered
  • System Maintenance – assisting SOC Engineers with maintenance on security devices, as needed
  • Projects - May lead moderately complex security projects as assigned


Is this a good fit? (Requirements):
 

  • Understanding of database concepts
  • Working experience as database administrator or database application developer
  • 5+ years of Information Security experience
  • Working experience with integration with different security systems and devices
  • 3+ years coding and scripting experience in Python, Linux shell scripting or Windows Powershell scripting etc.
  • Working experience and knowledge of SOAR platforms and solutions
  • 2 to 4 years of systems analysis
  • Working knowledge of Linux and syslog from CLI
  • Proven ability and past experience performing moderately complex security analysis for information technology is required
  • Familiarization with a variety of information and network security monitoring tools (ArcSight SIEM, QRadar SIEM, Splunk, Arbor DDoS Mitigation, Cisco IDS/IPS, Netcool, and Imperva WAF, among others)
  • Ability to work in a dynamic team-centered environment
  • Bachelor’s Degree in Computer Information Systems or related field


Industry Certifications:

All Analysts should possess the background and experience necessary to obtain Industry or SOC specific certifications as instructed by management
Possible applicable certifications include, but are not limited to:

  • Certified Information Systems Security Professional (CISSP)
  • Information Systems Security Engineering Professional (CISSP-ISSEP)
  • Systems Security Certified Practitioner (SSCP)
  • CompTIA Security+
  • Certified Ethical Hacker (CEH)
  • Certified Security Analyst (ECSA)
  • Certified Incident Handler (ECIH)
  • CompTIA Cybersecurity Analyst (CSA+)
  • Information Technology Infrastructure Library (ITIL)
  • Cisco CCNA
  • Cisco CCNP + Security
  • GSEC
  • GCIH
  • GCIA
  • MCSE
  • Linux+


If this sounds like the perfect fit, Apply Today!