Job Description

  • Perform investigations, threat hunting, and work cases as needed.
  • Act as an escalation point for Tier 1.
  • Communicate with IT staff regarding security-related incidents.
  • Assist in threat signature implementation and tuning.
  • Define and mature ‘playbooks’ for response to cyber threats.
  • Provide teaching/mentoring to junior analyst team members.
  • Participate and lead SOC training efforts.
  • Implement and maintain Splunk platform infrastructure and configuration.
  • Design and optimize Splunk platform architecture for large-scale and distributed deployments.
  • Customize queries.
  • Promote advanced searching, forensics, and analytics.
  • Additional responsibilities and tasks assigned by SOC management.

Requirements

  • Willingness to learn, adapt, and innovate.
  • Critical thinking and analytical skills.
  • Excellent written and oral communication skills.
  • Great interpersonal and teamwork skills.
  • Familiarity with common infrastructure technologies.
  • Networking background.
  • Strong understanding of Splunk Platform Configuration, Web UI, and Common Information Model.
  • Experience with advanced Splunk Search Processing Language (SPL).
  • 2 to 4 years of experience in security operations or a similar role.
  • Experience with log management, SIEM, and endpoint protection.
  • "On-call" availability (some nights, weekends, and holidays).

Competitive Applicants Will Have:

  • Experience in a Managed Services Role.
  • Experience as an incident responder.
  • Threat hunting experience.
  • Experience with tools and technologies such as Belkasoft Evidence Center, Velociraptor, Sysmon, Osquery, and MISP.
  • Working knowledge of industry best practices such as PCI-DSS, and NIST.

Employment Type

  • Full Time

Details

To see more jobs that fit your career