SOC Analyst T1 L2 at Kaseya Careers
Miami, Florida, United States -
Full Time


Start Date

Immediate

Expiry Date

23 Jan, 26

Salary

0.0

Posted On

25 Oct, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cybersecurity, Information Technology, Computer Science, Malware Analysis, Incident Response, Networking, PowerShell, Python, Communication Skills, Windows, macOS, Linux, Microsoft 365, Firewalls, NIST Frameworks, MITRE ATT&CK

Industry

Software Development

Description
Kaseya® is the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide powered by AI. Kaseya’s best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success. Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners www.insightpartners.com), a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve. Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide. To learn more about our company and our award-winning solutions, go to www.Kaseya.com and for more information on Kaseya’s culture. Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers. SOC Analyst T1 L2 Responsibilities: • Monitor, analyze and triage systems and events across Windows, macOS and Linux in a 24x7 operations environment and escalate to the Tier II Analyst as needed. • Identify suspicious/malicious activity spanning Windows Environments, Microsoft 365 & Entra, and Firewalls. • Perform incident detection, response & remediation. • Address and Resolve Managed SOC tickets. • Perform deep-dive incident analysis by correlating data from various sources and determining if critical system(s) is/are affected. • Perform tasks without supervision. Requirements: • Bachelors in Cybersecurity, Management and Information Systems, Information Technology, Computer Science, or other related fields. • Security+ (minimum), SSCP, CEH (a plus), PSAA. • Familiar with static and dynamic malware analysis techniques, 0-day vulnerabilities, phishing attacks, ransomware attack groups. • Familiar with MITRE ATT&CK, NIST frameworks, and the common components of networking (IP subnetting, private vs. public IP, LAN components) • Knowledge of various firewalls, syslog, JSON, and other network log formats. • Familiar with PowerShell, Python, CMD etc. • Excellent written and verbal communication skills. • Ability to work in a 24x7 environment including nights and weekends on rotation. • Must be authorized to work within the US and pass a background check. Join the Kaseya growth rocket ship and see how we are #ChangingLives ! Additional information Kaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
Monitor and analyze systems and events across various operating systems in a 24x7 operations environment. Perform incident detection, response, and remediation while addressing Managed SOC tickets.
Loading...