L2 SOC Analyst
Meet Our Recruiter
About the Role
The ideal candidate is someone currently operating at a Tier 2. Training will also be provided in the solutions that you will be interacting with, however experience within Detect and Response operations within a SOC environment would be essential. Eligible for SC Clearance is necessary for this role.
High Level Overview:
You will be there to support the L1’s when they escalate true positives and be able to offer confidence in your triage, investigation, escalation and remediation. This is an essential part of our growth as we have already moved to a 24/7 SOC. There will be support available from the on-call supervisor, however we would need you to be confident in identifying the above.
Responsibilities.
- Monitor and analyse traffic and events/alerts and advise on remediation actions.
- Investigate intrusion attempts and perform in-depth analysis of the attempt by correlating various sources and determining which system or data set is affected.
- Carry out Incident Response actions upon client infrastructure to mitigate and contain verified incidents or intrusion attempts.
- Follow standard operating procedures for detecting, classifying, and reporting incidents.
- Demonstrate security expertise to support timely and effective decision making of when to declare an incident.
- Conduct proactive threat research, with the goal to ingest additional IoC’s or create detection rules based off threat actor TTP’s.
- Create detection rules off the emerging threat landscape and new techniques used.
- Analyse a variety of network and host-based security appliance logs (Windows Security Events, Sysmon, Firewalls, NIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident, or how to effectively tune out false positives without hindering the effectiveness of the ruleset.
- Create playbooks and workbooks within the Azure Sentinel Solution
- Track trends and configure systems as required to reduce false positives from true events.
- Document all activities during an incident in order to ensure that the report and updates escalated to a client provides all necessary information, whilst also offering effective remediation actions and any reference material required.
- Escalate information regarding intrusion events, security incidents, and other threat indications and warning information to the client in a readable manner.
- Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions
- Create monthly Managed Detect and Respond (MDR) reports for clients
- Create articles for publication based off CTI investigations that have been undertaken
- Modify use cases and manage tuning for multiple clients
- Provide a daily shift change report
Essential Experience Required
- Experience with SIEM & EDR solutions (Azure Sentinel/AlienVault/Carbon Black/Defender for Endpoint), specifically with investigations and remediation actions.
- Organizational skills and time management/prioritization.
- Pro-active in maintaining their workload.
- Comfortable working against deadlines in a fast-paced environment.
- Solid foundation of core Information Security aspects (General Investigation process, overview knowledge of surrounding technologies and frameworks to improve an organisations security posture, pain points faced within the industry).
- Prior SOC experience.
Qualifications:
Any industry recognized certifications are highly desirable, however we are very big on training and offer a generous training package.