Description
How you will make an impact:
- Perform detailed analysis of security incidents and alerts, either through monitoring or escalation as a Tier 2 Analyst
- Investigate and respond to security incidents, including containment and eradication.
- Conduct root cause analysis using judgment and past precedents and provide recommendations for mitigation.
- Collaborate with other IT and security teams to resolve incidents.
- Develop and implement security monitoring use cases.
- Mentor Level 1 analysts and provide guidance on incident analysis and resolution documentation.
What we look for:
- Expanded knowledge of network security, intrusion detection/prevention systems (IDS/IPS), and endpoint protection.
- Demonstrated proficiency in threat hunting and malware analysis.
- Understanding of incident response procedures and digital forensics.
- Strong analytical and problem-solving skills.
- Certifications (optional but beneficial): CompTIA Security+, Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), and GIAC Certified Incident Handler (GCIH).
Behaviors of Successful Candidates:
- Continuous Learning: Stays up to date with the latest cybersecurity trends, threats, and technologies.
- Certifications: Seeks to obtain relevant certifications to grow skills and knowledge.
- Hands-on Experience: Desires gaining practical experience through lab environments or real-world scenarios.
- Networking: Joins cybersecurity communities, attends conferences, and engages with peers for knowledge exchange.
- Mentorship: Seeks mentorship from experienced professionals
Skills
Cybersecurity
Industry Sector