What are the responsibilities and job description for the SOC Analyst position at Transcend Business Solutions?
Title : SOC Analyst
Location : Crownsville, MD (100% onsite)
Must be local to DC area - no relocations
US Citizens only
Day Shift- 12 hour shifts, 3 days one week, 4 days the next. See below for work pattern
The Pitman Shift Pattern | WorkSight Flow | Scheduling Pay Solution
The SOC Analyst executes and helps to create operational processes for consistent monitoring of client environments and should be familiar with varieties of security tools and technologies. The SOC Analyst additionally works to support the Incident Response Team by conducting monitoring and analysis during incident management engagements.
Qualifications :
Duties and Responsibilities :
- Monitor, protect, and defend the enterprise perimeter against malicious network traffic.
- Monitor, protect, and defend internal networks and hosts against ongoing and emerging threats.
- Enrich monitoring logs with contextual operation data from functional areas correlate events and identify security issues, threats, and vulnerabilities
- Conduct security event analysis and validation, triage validated incidents, perform initial containment where feasible, research incident and enrich incident case documentation, and escalate incident for further analysis, containment, and eradication.
- Review and analyze threat intelligence information and proactively search application, system, network logs to hunt for and thwart relevant threats identified threats.
- Prepare and perform shift handover briefing to communicate completed and pending activities, and relay situational awareness information.
- Contribute to the development and maintenance of SOC Standard Operating Procedures (SOPs) and Concept of Operations (CONOPS) to establish and continuously improve organization operating knowledge base.
- Participate in post-incident activities and contribute to lessons learned to improve security operations.
- Provide support in preparation of management threat reports and briefings, and recommendations.
- Provide sound technical recommendations that enable remediation of security issues.
- Partner with security engineering to develop and refine SIEM correlation rules.
- Utilize advanced threat models, SIEM use cases, and incident response playbooks.
R equired Skills and Qualifications :
Desired Skills and Qualifications :