Job Description
Location: Hybrid (College Park, Maryland) or Remote (U.S. based candidates)
Schedule: Panama schedule (4 teams with rotating 12-hour shifts to provide 24/7 coverage, including 2 days on, 2 days off, 3 days on, 2 days off, 2 days on, 3 days off)
Position Overview:
We are seeking a skilled and motivated Security Operations Center (SOC) Analyst (Level 2) to join our dynamic team. In this role, you will be instrumental in helping global customers manage and strengthen their IT security. As part of a fast-paced, collaborative team, you will play a key role in minimizing the impact of security incidents and ensuring that essential business operations continue smoothly.
Key Responsibilities:
Monitor and analyze security events and alerts from multiple sources, such as SIEM software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix).
Investigate and differentiate between true threats and false positives using network and log analysis. Escalate potential intrusions and attacks as necessary.
Create and manage tickets, document incidents, and escalate to higher-level analysts when needed.
Serve as a technical escalation point and mentor for junior analysts, offering guidance and support.
Communicate regularly with customer IT teams to inform them of issues, assist in remediation, and ensure continuous business operations.
Perform triage of incoming issues, assess priorities, and determine the associated risk.
Collaborate with customers to deploy monitoring systems for both hardware and software.
Stay updated on the current threat landscape to maintain a proactive security posture.
Basic Qualifications:
Strong teamwork and collaboration skills.
Knowledge and experience with intrusion detection/prevention systems and SIEM software.
Solid understanding of network protocols and devices.
Hands-on experience with Mac OS, Windows, and Unix systems.
Expertise in analyzing event logs to detect signs of cyber intrusions/attacks.
Ability to remain calm and productive in high-pressure situations.
Experience working directly with customers to understand their security needs and provide feedback on services.
Excellent written and verbal communication skills, with the ability to explain complex technical concepts in clear, understandable language.
Strong interpersonal skills and the ability to work effectively with a globally distributed team.
Availability to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule.
Experience providing recommendations for security tool tuning.
Familiarity with tools like Wireshark, TCP Dump, Security Onion, and Splunk.
Preferred Qualifications:
2-4 years of hands-on experience in SOC/TOC/NOC roles.
Certifications such as GCIA, GCIH, GCFE, CISSP, Security+, Network+, CEH, RHCA, RHCE, MCSA, MCP, or MCSE.
Familiarity with tools like IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus.
Understanding of GPO, Landesk, or similar IT infrastructure tools.
Knowledge of programming/scripting languages and basic database query execution.
Education:
A minimum of a Bachelor's degree in Information Security, Computer Science, or a related IT field. Exceptional candidates with relevant experience in security or network operations will also be considered.
Employment Type: Full-Time
Salary: $ 40,000.00 140,000.00 Per Year
Job Tags
Full time, Rotating shift, Weekend work,