What are the responsibilities and job description for the SOC Analyst 2 (Cybersecurity Analyst) position at Brandon Consulting Associates, Inc.?
Job Description
Job Description
The purpose of this position is to provide tier two triage for information technology issues and information security incidents.
This position supports the Client, Security Operations Center (SOC). The purpose of this position is to provide tier two triage for information technology issues and information security incidents. As a tier two information security incident handler, this position will be responsible for information security incidents for the entirety of their lifecycle. This position will renew on 7 / 1 / 25.
Serve as the primary incident owner for the Security Operations Center. Leadefforts related to the incident handling processes such as incident discovery,analysis and verification, incident tracking, containment and recovery,incident response coordination, escalation, and notification. Lead efforts incoordinating with other teams to remediate detected incidents. Communicate intelligence to key personnel.
5 years' experience required in the following :
- Systems Security Certified Practitioner (SSCP), CompTIA Security (Security CE), CompTIA Cybersecurity Analyst (CSA ) or other information security certifications
- Strong understanding of security technologies and strategies, including but not limited to firewall, IDS, policy management, security processes / best-practice, logging / monitoring, antivirus, vulnerability assessment, patch management, and incident response
- Solid knowledge of common and emerging attack vectors, penetration methods and countermeasures.
- Knowledge of conflict resolution and incident escalation.
- Ability to work effectively with customers to solve business challenges while balancing the need for confidentiality, integrity, and availability.
- Demonstrated ability to resolve issues in a variety of complex situations which require complex judgments and solutions based on sophisticated analytical thought.
- Demonstrated ability to solve complex problems, convey both oral and written instruction, and handle multiple task interruptions while providing services in a professional and courteous manner.
- Proven ability to work with diverse audiences and translate technical information into non-technical information.
- Must be an individual of high integrity and be a model of unwavering integrity to others.
- Commitment to fostering a diverse working environment.
- Demonstrated ability to work independently, as part of a team of peers, and to support and contribute to a multidisciplinary team environment.
Required / Desired Skills :
SkillRequired / DesiredAmountExpirence you have in YearsSystems Security Certified Practitioner (SSCP), CompTIA Security (Security CE), CompTIA Cybersecurity Analyst (CSA ) or other information securityRequired5 yearsStrong understanding of security technologies and strategies, including but not limited to : firewall, IDS, policy management, security processes / best-Required5 YearsSolid knowledge of common and emerging attack vectors, penetration methods and countermeasures.Required5 YearsKnowledge of conflict resolution and incident escalationRequired5 YearsAbility to work effectively with customers to solve business challenges while balancing the need for confidentiality, integrity, and availability.Required5 YearsDemonstrated ability to resolve issues in a variety of complex situations which require complex judgments and solutions based on sophisticated analytiRequired5 YearsDemonstrated ability to solve complex problems, convey both oral and written instruction & handle multiple task interruptions while providing serviceRequired5 YearsProven ability to work with diverse audiences and translate technical information into non-technical informationRequired5 YearsMust be an individual of high integrity and be a model of unwavering integrity to others.Required5 YearsCommitment to fostering a diverse working environmentRequired5 Years
Questions : No.QuestionQuestion1What is your candidate's email address?Question2PROVIDE CANDIDIDATES CURRENT LOCATION (CITY / STATE) HERE : Question3SHOW YOUR WORK - In the summary of qualifications field under the details tab of the candidate's profile, you should explain why your candidate is the best fit for this position. Please confirm that you have thoroughly validated and attested to the accuracy of the credentials listed throughout this candidate's VectorVMS profile and resume according to Section 5.2.5 of ITS-009440. Do you confirm? Candidates will get rejected if an agency cuts and pastes the candidates' resumes into this field [REQUIRED]Question4Use of AI is Strictly Prohibited : Please be advised that the use of AI-generated responses during screenings and interviews is strictly prohibited. Confirm that your candidate has been informed of this policy and agrees to adhere to it. Non-compliance will result in disqualification from the interview process.Question5PROVIDE CANDIDATES FULL PHYSICAL ADDRESS where DOM DoIT Background Check form and Fingerprint cards are to be mailed [REQUIRED]Question6INTERVIEW DATES : Interviews will be conducted on [March 10th, 11th, and 12th] Only submit candidates available for interviews on the date(s) provided.