Recent Searches

You haven't searched anything yet.

9 SOC L2 Analyst Jobs in Detroit, MI

SET JOB ALERT
Details...
1 Point System
Detroit, MI | Full Time
$76k-93k (estimate)
3 Days Ago
Cloud Bigdata
Detroit, MI | Full Time
$82k-101k (estimate)
3 Days Ago
V2Soft
Detroit, MI | Full Time
$83k-102k (estimate)
3 Days Ago
ICONMA, LLC.
Detroit, MI | Contractor
$82k-101k (estimate)
3 Days Ago
Tandym Tech
Detroit, MI | Full Time
$82k-101k (estimate)
3 Days Ago
V-Soft Consulting Group
Detroit, MI | Contractor
$82k-101k (estimate)
3 Days Ago
Tandym Group
Detroit, MI | Contractor
$82k-101k (estimate)
3 Days Ago
Intellibee
Detroit, MI | Full Time | Contractor
$82k-101k (estimate)
4 Days Ago
Acruex
Detroit, MI | Contractor
$74k-90k (estimate)
4 Days Ago
SOC L2 Analyst
Cloud Bigdata Detroit, MI
Apply
$82k-101k (estimate)
Full Time 3 Days Ago
Save

Cloud Bigdata is Hiring a SOC L2 Analyst Near Detroit, MI

Position Description:

The SOC L2 Analyst position is a valued member of the Information Protection and Risk Management team.

The Analyst is part of the SOC (Security Operations Center) team and works closely with other members of the IPRM program to develop and implement a comprehensive approach to the management of security risks.

This role is responsible for working with other Security Operations Center team members in responding to security events according to established policies and best practices.

Job Responsibilities:

First level response for real time security alerts and events

Assist the Incident Response team in handling security events / incidents

Perform complex security investigations and root cause analysis

Data mining through use of SIEM or other data analytics solutions

Perform phishing investigations and response

Report generation around security events and metrics

Ensure that all security events are properly documented/tracked to meet audit and legal requirements

Develop documentation in support of response processes and/or procedures

Determine level of event severity and escalate as necessary

Qualifications:

Azure/AWS security, GCIA, GCIH, or other GIAC certifications preferred

Practical understanding of network protocols and operating systems

Broad understanding of security mitigation solutions at all layers

Minimum of four years information security specific experience

Bachelor's degree in information systems or equivalent experience

Ability to analyze large data sets to identify trends/anomalies indicative of malicious activity

Good understanding of application logic flow

Understanding or background in code development

Awareness of the current threat landscape

Self-driven and motivated with a strong passion for cybersecurity

Excellent verbal and written communications skills

Excellent problem solving and troubleshooting skills with a strong attention to detail

Ability to interact with personnel at all levels across the organization and to comprehend business imperatives

Ability to thrive in a fast-paced environment and capable of working under pressure

Experience in Security Operation Center/Incident response;

Splunk practical experience.

Good communication skills:

customer facing calm even demeanor when challenged, proactive, team player who works well with others and work well collaboratively.

Able to challenge respectfully and look for opportunities for continuous improvement.

Job Summary

JOB TYPE

Full Time

SALARY

$82k-101k (estimate)

POST DATE

06/27/2024

EXPIRATION DATE

07/10/2024

Show more

Cloud Bigdata
Full Time
$88k-110k (estimate)
3 Days Ago
Cloud Bigdata
Full Time
$88k-110k (estimate)
3 Days Ago
Cloud Bigdata
Full Time
$84k-103k (estimate)
3 Days Ago