SOC Level 2 Analyst (Q Clearance) at ShorePoint
Las Vegas, Nevada, USA -
Full Time


Start Date

Immediate

Expiry Date

16 Oct, 25

Salary

0.0

Posted On

17 Jul, 25

Experience

1 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Behavior Analysis, Ids, Siem, Indicators, Ips, Edr

Industry

Information Technology/IT

Description

WHO WE ARE:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.

WHO WE’RE LOOKING FOR:

We are seeking a SOC Level 2 Analyst for a potential opportunity to provide advanced monitoring, triage and response within a 24/7 Security Operations Center (SOC) environment. This role plays a key part in identifying and investigating security incidents, advising on mitigation and improving monitoring content and procedures. The SOC Level 2 Analyst will have hands-on experience with security technologies and be ready to contribute to threat detection, content development and continuous service improvement in a fast-paced operational setting. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

WHAT YOU NEED TO KNOW:

  • Strong understanding of SOC operations, incident response workflows and monitoring tools.
  • Experience with malware behavior analysis and identification of indicators of compromise.
  • Familiarity with APT tactics, techniques and procedures.
  • Knowledge of security technologies such as SIEM, EDR, IDS/IPS and WAF.
  • Understanding of networking fundamentals, protocols (TCP/IP, DNS, HTTP) and infrastructure devices.
  • Awareness of security architecture principles and common defensive tools.
Responsibilities
  • Monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information. This includes the monitoring of real-time channels or dashboards, periodic reports, email inboxes, helpdesk or other ticketing systems, telephone calls and chat sessions.
  • Follow client and incident-specific procedures to perform triage of potential security incidents to validate and determine needed mitigation.
  • Escalate potential security incidents to client personnel, implement countermeasures in response to others and recommend operational improvements.
  • Keep accurate incident notes in the case management system.
  • Maintain awareness of the client’s technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence and recent security incidents.
  • Provide advanced analysis of the results of the monitoring solutions, assess escalated outputs and alerts from Level 1 Analysts.
  • Perform web hunting for new patterns/activities.
  • Advise on content development and testing.
  • Provide advice and guidance on the response action plans for information risk events and incidents based on incident type and severity.
  • Ensure that all identified events are promptly validated and thoroughly investigated.
  • Provide end-to-end event analysis, incident detection and manage escalations using documented procedures.
  • Devise and document new procedures and runbooks/playbooks as directed.
  • Maintain monthly Service Level Agreements (SLAs).
  • Maintain compliance with processes, runbooks, templates and procedures-based experience and best practices.
  • Assist the Cyber Hunting team with advanced investigations as needed.
  • Provide malware analysis (executables, scripts, documents) to determine indicators of compromise and create signatures for future detection of similar samples.
  • Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc.
  • Perform peer reviews and consultations with Level 1 Analysts regarding potential security incidents.
  • Serve as a subject matter expert in at least one security-related area (e.g., specific malware solution, Python programming, etc.).
  • Provide shift status and metric reporting as well as support weekly operations calls.
Loading...