SOC Analyst
at DXC Technology
Aldershot, England, United Kingdom -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 10 Feb, 2025 | Not Specified | 10 Nov, 2024 | N/A | Learning Environment,Sc,Source Intelligence,Triage,File Systems,Event Correlation,High Pressure Situations,Rapid Response,Adherence,Log Analysis,Linux,Operational Efficiency,Windows,Situational Awareness,Ip Addressing | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
DUE TO THE CUSTOMER REQUIREMENTS SUCCESSFUL APPLICANTS MUT BE ELIGIBLE FOR HIGH LEVEL UK SECURITY CLEARANCE, SC AND BE ABLE TO WORK ONSITE IN ALDERSHOT
Responsibilities:
- Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions.
- Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents.
- Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs).
- Investigate potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity.
- Use OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
- Monitor the threat landscape and document findings on evolving threat vectors, sharing relevant insights with CTAC teams to enhance overall situational awareness.
- Follow established incident response playbooks, providing feedback for enhancements and suggesting updates to streamline CTAC processes and improve threat response times.
- Coordinate with Tier 3 Analysts and management to refine detection and response workflows, contributing to continuous SOC maturity.
- Collaborate with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity, submitting tuning requests and testing configurations when necessary.
- Identify gaps in current detection content and work with Senior Analysts to develop and validate new detection rules and use cases tailored to the organization’s threat profile.
- Act as a mentor to Tier 1 Analysts, offering guidance on triage and analysis techniques and facilitating on-the-job training to elevate their technical skills and operational efficiency.
- Assist in training sessions and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC.
KNOWLEDGE AND SKILLS
- Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
- Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
- Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
- Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
- Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
- Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
- Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
- Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
- Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
- Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in incident management.
Responsibilities:
- Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions.
- Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents.
- Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs).
- Investigate potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity.
- Use OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
- Monitor the threat landscape and document findings on evolving threat vectors, sharing relevant insights with CTAC teams to enhance overall situational awareness.
- Follow established incident response playbooks, providing feedback for enhancements and suggesting updates to streamline CTAC processes and improve threat response times.
- Coordinate with Tier 3 Analysts and management to refine detection and response workflows, contributing to continuous SOC maturity.
- Collaborate with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity, submitting tuning requests and testing configurations when necessary.
- Identify gaps in current detection content and work with Senior Analysts to develop and validate new detection rules and use cases tailored to the organization’s threat profile.
- Act as a mentor to Tier 1 Analysts, offering guidance on triage and analysis techniques and facilitating on-the-job training to elevate their technical skills and operational efficiency.
- Assist in training sessions and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC
REQUIREMENT SUMMARY
Min:N/AMax:5.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Other
Graduate
Proficient
1
Aldershot, United Kingdom