What are the responsibilities and job description for the Stratascale Associate Security Analyst - Operations position at SHI International Corp.?
The Associate Security Analyst will play a vital role in ensuring our client’s incidents are investigated, triaged, or action taken to remediate the incident. Their primary responsibility will be to support the alert management and incident handling process across multiple platforms and security technologies while providing in-depth analysis of alerts for our clients.
The Associate Security Analyst, will ensure timely investigation, actioning, and escalation of alerts using their expertise in incident handling, MDR, and SIEM technologies. They will guide clients through threat mitigation, perform threat hunting activities, and review clients' defense strategies for process improvements. Additionally, they will contribute to policy development, stay up-to-date with cybersecurity threats and mitigation techniques, and maintain high cybersecurity standards. Adapting to evolving security landscapes is crucial to your success in this role.
This position will report to the Charlotte, NC office on a hybrid schedule.
Include, but not limited to:
- Support clients by understanding their environment, needs, and challenges to their unique organization.
- Support incident handling processes across multiple platforms and security technologies including Windows, Linux and macOS.
- Provide in-depth analysis of escalated requests originating from clients or their Managed Detection & Response (MDR) services.
- Validate suspicious events by performing investigations using SIEM and SOAR technologies, leveraging threat intelligence and OSINT, TTPs and IOCs.
- Identify gaps in client environments, data ingestions, or configuration errors which reduce quality of security alerts.
- Work with client and leadership to surface and resolve concerns around the security program.
- Provide support to Security Analysts include coaching and training as necessary.
- Provide support in writing and updating training materials and Standard Operating Procedures.
- Leverage your knowledge of Alert Triage, SOC Operations, and Depth in Defense strategies to contribute to projects for overall client success
- Produce high-quality written and verbal communications, recommendations, and findings to client management in a timely manner
- Provide the client with a complete understanding of the investigations and suggest corrective actions to resolve alerts.
- Participate in the development of cross-practice training or delegate training to team members on practice discipline capability, associated offerings, industry positioning and selling strategies.
- Address improvement opportunities within Stratascale for automation and process improvements.
- Provide off-hours support for Alert Management - as assigned.
- 1 years' experience of alert management across multiple SIEMs such as Splunk, Log Rythm, and Sentinel.
- 1 years' experience in alert tuning, threat detection, and incident response is also critical skills that will be required.
- 1 years' experience of cyber security principles, concepts and practices including the ability to perform a complete and thorough incident investigation and triage with limited support.
- 1 years' experience working with modern SOC solutions to include, but not limited to SIEM, EDR, Firewalls, Cloud Providers, Web Applications, etc.