SOC Security Analyst

3 weeks ago


Media, Pennsylvania, United States TEKsystems Full time
Job Description

TEKsystems is seeking a highly skilled SOC Analyst to join our team. As a SOC Analyst, you will play a critical role in the detection, response, and remediation of cyber-related attacks on the enterprise.

Key Responsibilities:
  • Assist in the detection, response, and remediation of cyber-related attacks on the enterprise.
  • Support incident response and forensics activities, including host triage and retrieval, malware analysis, remote system analysis, and remediation efforts.
  • Work with a managed security service provider (MSSP) to onboard new event sources and use cases.
  • Utilize technologies such as DLP, DNS, IPS, proxy, SIEM, and related endpoint, mobile, and cloud controls to complete incident response activities and threat hunting.
  • Provide thorough results, which are documented and correlated.
  • Work with IT and business areas to respond to and perform incident investigations for severity level incidents (high, medium, low).
  • Maintain skills and capabilities required to maintain, process, and develop intelligence products that are actionable to internal InfoSec functions, Cyber Security stakeholders, and the business areas.
  • Gain understanding and employ multiple analytical frameworks to drive Cybersecurity Maturity model lifecycle against threats that are of interest to the InfoSec organization.
  • Provide support in the detection, response, mitigation, and reporting of real or potential cyber threats to the organization and assist in the automation of these processes.
  • Perform threat intelligence collection, analysis, and actionable intelligence extraction from the numerous cyber threat intelligence sources that are available externally and internally to the InfoSec organization.
  • Assist in developing detection and alert criteria and work directly with Operational Support Team to drive monitoring and defense improvements.
  • Assist as needed with forensic analysis of network packet captures, DNS, proxy, malware, host-based security, and application logs, as well as logs from various types of security sensors.
  • Perform root cause analysis of security incidents for further enhancement of overall InfoSec defenses.
  • Provide metrics to measure the effectiveness of the incident response program at request of Security leadership and SOC lead.
  • Participate in incident response operations and development of standard operating procedures, run books, and related templates. Recommend process improvements.
  • Participate in all tabletop exercises.
  • Update incident response plan and procedures as well as SOC runbooks.
  • Provide support, maintenance, and development of the Security Information and Event Monitoring (SIEM) platform. This includes the integration of standard and non-standard logs into SIEM solution while revising and developing processes to strengthen security operations.
  • Assist in overseeing and providing feedback for third-party managed security service provider(s).
  • Participate in testing to validate effectiveness of security monitoring and alerting.
  • Assist with the static and dynamic malware analysis to support InfoSec defenses and understanding of threat actor TTPs.
  • Serve as a POC in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, and remediation efforts.
  • Create the necessary interpersonal networks among information security and line-of-business staff, compliance, audit, physical security, legal, and HR to ensure alignment.
  • Begin to develop and maintain external networks consisting of industry peers, ecosystem partners, vendors, and other relevant parties to address common trends, findings, threats, and cybersecurity risks.
  • Act as a technical resource for internal business teams and the IT department to plan, implement, and support new and existing technologies. Serve as an expert in the technical field of knowledge.
  • Participate in IT and security-related projects.
  • Assist the enterprise architecture and engagement teams to ensure that information security requirements are built into architectures and new technology projects.
  • Maintain working knowledge of Payment Card Industry (PCI) Data Security Standard compliance by keeping apprised of changes to the standard, evaluating new systems for impact, and supporting annual PCI audit.
  • Support audit and assessment process for IT, including annual PCI audit, IT general controls review, and any other audits or assessments of security and general IT controls.
  • Support forensic investigations and data acquisition supporting legal holds.
  • Assist in incident identification, assessment, quantification, reporting, communication, and mitigation.
  • Monitor for external threats, assessing risk to the environment, and driving proactive risk mitigation and response activities.
  • Report common and repeated problems (trend analysis) to SOC Team lead and propose process and technical improvements.
Requirements:
  • Minimum of 3 years of experience in a combination of incident response, information security, and IT.
  • Understanding of relevant legal and regulatory requirements, such as Payment Card Industry Data Security Standard.
  • Degree in technology-related field preferred, or equivalent work- or education-related experience.
  • Professional security management certification is desirable, such as Certified Forensic Investigator (CFI), Certified Forensic Examiner (CFE), Certified Hacking Forensic Investigation (CHFI), GFCA Certified Forensic Analyst (GIAC), or other similar credentials.
  • Foundational knowledge of incident response standards such as NIST 80-61, Computer Security Incident Handling Guide, and ISO/IEC 27035:2016, information security incident management.
  • Foundational knowledge of information security concepts and technologies such as: networking, network segmentation, vulnerability scanners, firewalls, IPS/IDS, network analyzers, data loss prevention, security event management, encryption technologies, proxies, cloud services, mobile devices, etc.

  • SOC Security Analyst

    2 weeks ago


    Media, Pennsylvania, United States TEKsystems Full time

    Job SummaryThe SOC Security Analyst plays a critical role in the detection, response, and remediation of cyber-related attacks on the enterprise. This position supports incident response and forensics activities, participating in incident response operations and developing standard operating procedures. The ideal candidate will have a strong understanding of...


  • Media, Pennsylvania, United States Wawa Full time

    Job Title: Central Station Analyst Job Summary: The Central Station Analyst is a critical role at Wawa, serving as the first point of contact for all emergency and non-emergency contacts for our stores. This position requires exceptional customer service skills, attention to detail, and the ability to work well under pressure. Key Responsibilities: *...


  • Media, Pennsylvania, United States Wawa Full time

    Job Title: Central Station Analyst Job Summary: The Central Station Analyst is a critical role at Wawa, serving as the first point of contact for all emergency and non-emergency contacts for our stores. This position requires a high level of professionalism, attention to detail, and excellent communication skills to deliver a best-in-class contact...


  • Media, Pennsylvania, United States McLaren USA Full time

    Job Summary:As a key member of the McLaren USA team, we are seeking an experienced Database Systems Administrator to join our IT department. The successful candidate will be responsible for the management of database services in a large enterprise environment. This includes managing the full lifecycle of database infrastructure while applying creativity and...


  • Media, Pennsylvania, United States LHH Recruitment Solutions Full time

    Job OpportunityLHH Recruitment Solutions is proud to partner with a distinguished company in Media, PA, to find a Senior Accountant for the insurance sector. This direct hire opportunity requires full-time onsite presence.Key Responsibilities:Collaborate with sales to forecast new client and product profitability.Enhance financial reporting by integrating...


  • Media, Pennsylvania, United States McLaren USA Full time

    Job Summary:As a skilled Database Administrator, you will be responsible for the management of database services in a large enterprise. Your primary focus will be on managing the full lifecycle of database infrastructure while applying creativity and industry best practices. Your day-to-day activities will include database operations (incident, problem,...


  • Media, Pennsylvania, United States McLaren USA Full time

    Job Summary:As a key member of the McLaren USA team, the Database Systems Administrator will be responsible for the management of database services in a large enterprise. This role involves managing the full lifecycle of database infrastructure while applying creativity and industry best practices. Day-to-day activities include database operations (incident,...

  • SOC analyst

    4 weeks ago


    Media, United States TEKsystems Full time

    Job DescriptionJob DescriptionTop Skills' Details1. At least 5 years in IT, and at least 3+ years’ experience working in a SOC and/or participating in Incident Response activities such as host triage and retrieval, malware analysis, remote system analysis, and remediation efforts. Additional IT background in systems administration, networking, help...

  • SOC analyst

    1 month ago


    Media, United States TEKsystems Full time

    Job DescriptionJob DescriptionTop Skills' Details1. At least 5 years in IT, and at least 3+ years’ experience working in a SOC and/or participating in Incident Response activities such as host triage and retrieval, malware analysis, remote system analysis, and remediation efforts. Additional IT background in systems administration, networking, help...