What are the responsibilities and job description for the SOC Analyst position at Alleare Consulting?
Job Details
SOC Analyst L1 & L2
Fulltime
Dallas, Texas (hybrid)
IMMEDIATE new job openings for L1 & L2 SOC Analysts to join our clients Dallas based team and work in a hybrid setting. This position is responsible for heavy log analysis, monitoring multiple feeds in a 24/7 environment to immediately detect, verify, and respond swiftly to cyber threats, e.g. vulnerability exploitation, malware, cyber-attacks, etc.; serving as a technical escalation resource and provide mentoring for Tier 1 Security Operations Center (SOC) analysts; working collaboratively with multiple teams and personnel; working with other SOC analysts as well as subject matter experts within the larger distributed Cyber defense team including; cyber threat hunters, threat intelligence analysts and forensic investigators; participating and take active role in red-team/blue-team simulated attacks and table top exercises; partnering with Security Design and Architecture Engineers to implement and improve technology and process to enhance SOC monitoring, investigation, and response capabilities.
Responsibilities
Monitor multiple feeds in a 24/7 environment to detect and respond to cyber threats.
Serve as a technical escalation resource for Tier 1 SOC analysts.
Mentor Tier 1 SOC analysts.
Collaborate with multiple teams and personnel within the Cyber defense team.
Participate in red-team/blue-team simulated attacks and tabletop exercises.
Partner with Security Design and Architecture Engineers to enhance SOC capabilities.
Requirements
3-5 years of experience as a SOC Analyst
Experience building queries and extracting data from logs
MSSP industry experience
Log analytics experience
Security Blue Team Level 2 (BTL2) and/or SANS certifications
Experience with event analysis leveraging SIEM tools (e.g. Splunk, ArcSight)
Log parsing and analysis skills with experience developing correlation rules
Experience with NIDS/HIPS/EDR infrastructure & tools
Experience with signature development/management (e.g. Snort rules, Yara rules)
Experience with protocol analysis and tools (e.g. Wireshark, Gigastor, Netwitness)
Experience mentoring and training junior analysts
Working knowledge of current cyber threat landscape
Working knowledge of Firewall and Proxy technology
Knowledge of malware operation and indicators
Knowledge of Data Loss Prevention monitoring
Knowledge of forensic techniques
Knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP)
Knowledge of penetration techniques
Bachelor's Degree in Computer Science or Information Systems
Experience in an enterprise environment with tools like ArcSight, Sourcefire, TrendMicro DDI, Splunk, Hadoop
Experience in System or Network Administration, Penetration Testing, or Application Development
**To view all of our open positions, please visit our Alleare Consulting website.