Match score not available

SOC Analyst

extra holidays
Remote: 
Full Remote
Contract: 
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

Bachelor's degree in Cybersecurity or related field (preferred), Experience with SIEM and EDR tools, Strong knowledge of Networking and Operating Systems, Understanding of the security incident lifecycle, Basic knowledge of forensic methodologies.

Key responsabilities:

  • Monitor security tools for detection and identification
  • Investigate and respond to security incidents
  • Develop and tune security alerts
  • Conduct proactive threat hunting and vulnerability research
  • Document investigations and responses clearly
Ciena logo
Ciena Telecommunication Services XLarge https://www.ciena.com/
5001 - 10000 Employees
See more Ciena offers

Job description

Ciena is committed to our people-first philosophy. Our teams enjoy a culture focused on prioritizing a personalized and flexible work environment that empowers an individual’s passions, growth, wellbeing and belonging. We’re a technology company that leads with our humanity—driving our business priorities alongside meaningful social, community, and societal impact.

Not ready to apply? Join our Talent Community to get relevant job alerts straight to your inbox.

The Security Organization 

The Security team at Ciena is a tightly knit group of skilled professionals who share the same passion for defending against cyber criminals. With the increase in volume and sophistication of cyber-crime, we are growing and have tons of exciting work planned. This may require working extra hours on an as needed basis.

What will you do at Ciena?

The SOC Analyst role will support the Ciena security program through active monitoring, analysis and classification of security events in the enterprise environment.

The analyst will be expected to investigate and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. The analysts must be capable of independently performing security investigations covering all facets of an enterprise environment (e.g. network, endpoint, identity, cloud, data access, etc.)

The analyst should have familiarity with the incident response lifecycle, principles of network and endpoint security, current threat and attack trends, OSI model, and have a working knowledge of defense in depth strategies.

The analyst will be responsible for various activities within the security incident response lifecycle including detection, analysis, containment, eradication, recovery, and incident post-mortem reviews. The analyst will be expected to thoroughly document their investigations and response actions.

The analyst will assist with development of new security alerts and tuning existing alerts for improving detection accuracy. The analyst will also be responsible for performing proactive threat hunting, vulnerability and threat intelligence research as well as reviewing threat intelligence reports from our security partners.
 

Operations:

  • Monitor SIEM, EDR, and other security tools for detection and identification of security events
  • Document security investigations in a clear and consistent manner
  • Develop new use cases for security alerts
  • Tune existing use cases to improve accuracy
  • Tune endpoint and network security tools as needed
  • Perform threat hunting to identify potential security threats
  • Perform vulnerability and threat intelligence research
  • Review threat intelligence reports
  • Ability to work after hours if needed


Security Event Response:

  • Perform security anomaly and event detection
  • Investigate, contain, and resolve security anomalies and events
  • Perform threat attribution
  • Identification of likely threat vector for security events and incidents


Minimum Qualifications:

  • Ability to read, write, speak and understand the English language to communicate with employees, customers, suppliers, in person, on the phone, and by written communications in a clear, straightforward, and professional manner
  • Experience working with multiple SIEM, EDR, Log Aggregators, and Incident Response Management solutions
  • Strong technical knowledge of Networking, Operating Systems and enterprise integrations
  • Firm understanding of the security incident lifecycle
  • Thorough understanding of TCP/IP
  • Understand IDS / IPS rules to identify and/or prevent malicious activity
  • Basic knowledge of forensic methodologies and best practices to investigate intrusions, preserve evidence and coordinate a unified security response
  • Ability to proactively perform threat hunting to identify undetected security events
  • Basic knowledge of malware analysis
  • Basic understanding of SQL
  • Understanding of Packet Analysis (PCAP) and Packet Analysist software


Preferred Qualifications:

  • Bachelor’s degree in Cybersecurity, Computer Engineering, Information Technology or related field.
  • Candidate will possess ability to be a successful self-starter
  • Experience with Python, PowerShell, and API programming is a plus
  • Understanding of the MITRE ATT&CK and Cyber Kill Chain frameworks

#LI-SM

Not ready to apply? Join our Talent Community to get relevant job alerts straight to your inbox.

At Ciena, we are committed to building and fostering an environment in which our employees feel respected, valued, and heard.  Ciena values the diversity of its workforce and respects its employees as individuals. We do not tolerate any form of discrimination.
Ciena is an Equal Opportunity Employer, including disability and protected veteran status.
If contacted in relation to a job opportunity, please advise Ciena of any accommodation measures you may require.

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Industry :
Telecommunication Services
Spoken language(s):
EnglishEnglish
Check out the description to know which languages are mandatory.

Other Skills

  • Analytical Thinking
  • Verbal Communication Skills
  • Problem Solving

Related jobs