What are the responsibilities and job description for the Security Operations Specialist position at Mindlance?
Job Title : SOC Analyst
Location : Zebulon, NC (100% onsite)
Duration : 18 Months Contract
Shift : Shift : 3rd Shift - This is a 3rd Shift position (10pm to 8am), Wed- Sat (four 10-hour shifts)
Description
Bachelor Degree : (Required, Preferred or Not Required)
Not Required.
Role Responsibilities : (what they will be doing)
- The Cyber Threat Analyst, or SOC Analyst, is a triage specialist within the Security Operations Center within the larger Cyber Fusion Center (CFC) org. These analysts are responsible for working alerts in a diligent manner to assess them for signs of malicious or highly anomalous behavior. Aided by automation, alerts will need to be escalated as appropriately to more advanced analysts, leads, responders, and cyber managers.
- This role with have an emphasis on cloud, particularly AWS and Azure.
- The Senior SOC Analyst is an experienced SOC role within the 24 / 7 Cyber Fusion Center (CFC) organization. The role is responsible for monitoring, triaging, and escalating security events properly in any technology environment.
- This role will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS alerts, firewalls, network traffic logs, cloud platforms, and SOAR solutions) to analyze events that occur within their environments for the purposes of mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis.
- Characterize and analyze alerts to understand potential threats.
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
- Document and escalate incidents that may cause ongoing and immediate impact to the environment.
- Provide daily summary reports of events and activity relevant to cyber operations.
- Perform cyber Operations trend analysis and reporting.
- Perform thorough and high-quality triage and analysis for all alerts.
- Demonstrate strong communication skills both written and verbal.
- Actively engage in team chats, calls, and face to face settings.
- Constantly contribute to SOC runbooks.
- Recommend improvements to automations, alert fidelity, and security controls..
Must Have Skills / Prior Experiences : (Vendor should not submit any candidate that does not have these skills / prior experience.)
Qualifications
Plus / Nice to Have Skills / Prior Experiences : (Hiring Manager DOES NOT require these skills / prior experience. However candidates with any of these will be looked at first.)
EEO :
Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of – Minority / Gender / Disability / Religion / LGBTQI / Age / Veterans.”