SOC N1 Security Analyst

at  Tangentia

Toronto, ON, Canada -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate17 Oct, 2024Not Specified18 Jul, 2024N/AQradar,Mac,Ip,Windows,Network Devices,Icmp,Asset Management,Network Architecture,Linux,Operating Systems,Computer ScienceNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

JOB DESCRIPTION:

The SOC N1 Security Analyst is responsible for protecting client infrastructures from cyberattacks. To do this, they will need to detect, qualify, and respond to security events.
Main Responsibilities:

Alert Management:

  • Monitor security incidents;
  • Conduct in-depth analysis of incidents, classify them according to procedures, and determine if they pose a real threat or not;
  • Handle or escalate alerts according to procedures;
  • Create tickets in the dedicated platform (Connecwise);
  • Follow up on assigned alerts;
  • Produce documentation related to incidents and their handling;
  • Communicate with clients as needed;
  • Monitor our clients infrastructures to detect threats ("health check").

Client Relationship:

  • Maintain the relationship with the client. Communicate and collaborate with clients to share information on incidents or events (when critical).

Training:

  • Participate in the onboarding process;
  • Participate in team training;
  • Stay informed about technological developments (training, reading) and sector news.

Leadership:

  • Propose improvements that can be made to the SOC;
  • Follow SOC procedures.
  • Security
  • Ensure the protection of client data;
  • Follow the company’s and clients’ data security guidelines;
  • Report incidents and anomalies affecting ESI operations to the internal security team.
  • Additional Information about the Position:
  • Use existing tools and provide feedback to levels 2 and 3 for continuous improvement;

Desired Profile:

  • Completed education in computer science;
  • Operating systems (Linux, Windows, Mac (optional));
  • Network protocols (TCP, UDP, IP, ICMP, L7 protocols);
  • Basic knowledge of SIEM technologies;
  • Best practices in network architecture and basic understanding of network devices;
  • Basic Knowledge on Asset management;
  • Security threats and attack countermeasures;
  • Knowledge and expertise of Qradar
  • Ability to find relevant information on global threats;
  • Ability to conclude an incident analysis in 20-40 minutes or escalate in 20-40 minutes;
  • Ability to learn from a previous escalation to deduce the escalation of a similar incident;
  • Have or be preparing one of the following certifications:
  • CompTIA CYSA;

Responsibilities:


REQUIREMENT SUMMARY

Min:N/AMax:5.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Systems Administration

Graduate

Proficient

1

Toronto, ON, Canada