Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organization's cybersecurity posture.
Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive.
Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting.
Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends.
Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities.
Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions.
Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders.
Requirements
comptia
ceh
soc experience
bachelor's
communication
siem
Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous.
Have Experience: 5+ years of SOC experience with focus on security event analysis and incident response is advantageous.
Have Bachelor’s degree in Cybersecurity, Information Technology, or a related field
Have a Communication Skills: Excellent verbal and written communication skills.
Occasionally working remotely from home or any other work location
Have Technical Skills: Strong analytical skills in cybersecurity. In-depth knowledge of various Cloud security concepts, EDR, SIEM, and SOAR, and experience with responding to complex cybersecurity incidents is desirable.
Benefits
Additional elected or voluntary benefits
Safety net of life insurance and disability programs
Tailored financial programs
Contemporary work-life balance policies and wellbeing activities
Have Time Flexibility: This position may require working non-traditional hours.