Title: SOC Analyst-Tier 2
Location: Orlando FL / Miami FL
Shift time: 10:00 pm to 6:00 am.
need 3-4 in each location
They can hire folks now doing SOC or Cyber Security work. Or they can hire people that are doing technical work now that is not security related if they have Security Certs or a Degree in Security
SOC Tier 2 – Miami, FL or Orlando
What You’ll Do
As a Tier 2 SOC Analyst, your role is pivotal in enhancing the security posture of our organization. You’ll leverage your expertise to monitor and analyze security events, investigate incidents, and provide advanced threat detection and response. Collaborating closely with Tier 1 analysts and other security teams, you’ll triage and escalate security incidents as necessary, ensuring timely resolution and minimizing impact. Your responsibilities include fine-tuning detection mechanisms, developing playbooks, and conducting thorough forensic analysis to identify root causes and mitigate future risks. Additionally, you’ll contribute to continuous improvement initiatives by providing insights and recommendations based on your findings. Your proactive approach and technical proficiency are crucial in safeguarding our systems and data against evolving cyber threats.
What We Are Looking For
We are seeking a skilled Tier 2 SOC Analyst to join our team at RocketCyber. The ideal candidate will possess a strong background in cybersecurity and experience in incident detection, analysis, and response. Key attributes include proficiency in security monitoring tools, the ability to analyze and interpret security logs, and a proactive mindset in identifying and mitigating security threats. Excellent communication skills and the ability to collaborate effectively with cross-functional teams are essential. The ideal candidate should also demonstrate a commitment to staying updated on emerging threats and technologies to ensure our organization remains resilient against cyber threats.
Essential Duties And Responsibilities
Monitor, Analyze and Triage systems and events across Windows, macOS and Linux in a 24×7 operations environment in support of Tier I analysts OR independently review, assess, and act.
Identify suspicious/malicious activity spanning Firewalls, Office 365 & Azure AD.
Perform deep-dive incident analysis by correlating data from various sources and determine if a critical system is affected.
Perform static and dynamic malware analysis.
Perform offensive and defensive testing in virtual environments.
Perform incident detection, response & remediation, threat hunting, digital forensics, and configure alerting rules.
Identify and propose areas for improvement.
Work independently and have a strong attention to detail and excellent documentation skills.
Manage and delegate tasks to other team members.
What You’ll Bring
Masters in Cybersecurity, Management and Information Systems, Information Technology, Computer Science, or other related fields OR 2+ years of relevant SOC work experience and a Bachelor’s degree.
CEH, CySA+, eJPT, PNPT, OSCP, CISSP (one or more).
Knowledge of security technologies such as SIEM, SOAR, EDR, FW, IPS/IDS, Sandboxes.
Knowledge of various firewalls, syslog, and other network log formats.
Knowledge of network and common cryptographic protocols.
Scripting experience with PowerShell, Bash, Java, Python or C++
Have excellent written and verbal communication skills.
Ability to work non-standard work hours including nights and weekends.
Must be authorized to work within the US and pass a background check.
Tagged as: Soc analyst