L2 SOC Analyst
2 weeks ago
Our client is seeking an L2 SOC Analyst to provide level 2 support and escalations capabilities to the SOC.
***
**Experience and Qualifications**:
- Experience in the following is required
- SOC operations and tools (SIEM, EDR, etc.)
- Vulnerability management experience
- MSP/MSSP experience
- Microsoft security stack (Intune, Azure, ATP, Defender)
- 3+ years in a SOC environment
- Threat Hunting
**Experience in the following is desirable**
- Microsoft Azure Sentinel
- Scripting (PowerShell, Python, regex)
- Other security tools a bonus
- Control frameworks (ISO, PCI DSS, CIS, and/or NIST)
- Working with remote team
- 5+ years in a cybersecurity environment
- End Point Protection, Cloud Security, Security Incident and Event Management, Managed Anti-Virus Services, CASB, Data Loss Prevention
- Threat and security research and investigation
- Ability to provide information and audits and reporting for supported technologies.
- Present on risk findings and vulnerabilities in a client environment
- Conduct and develop security controls and put in measures to mitigate and prevent threats, vulnerabilities to prevent attacks on client environments
- Ability to create root cause analysis and reporting on events
- Facilitates the analysis of a client threat landscape during cyber-attacks activity.
**Desirable Qualifications**
- Cybersecurity related certifications.
- Microsoft Security stack certifications.
- MS AZ-900
- MS AZ-500
- MS SC-200
- MS SC-300
- MS SC-400
- Comptia N+
- Comptia S+
- Other technical security and vendor qualifications a bonus
- Mimcast certified
- BTL1