Match score not available

SOC Analyst – T1 / T2

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Bachelor's degree in computer science or related field., 2-4 years in cybersecurity roles within a SOC., Experience with SIEM tools and security alerts., Familiarity with MITRE ATTCK Framework..

Key responsabilities:

  • Triage incoming security alerts.
  • Support incident response investigations.
  • Enhance alert management processes.
  • Operate and configure security tools.

Gabtech Global, LLC logo
Gabtech Global, LLC https://www.gabtechglobal.com/
51 - 200 Employees
See all jobs

Job description

This is a remote position.

**PLEASE CAREFULLY READ ALL THE DETAILS BEFORE APPLYING***


Job Title: SOC Analyst – T1 / T2  (WFH/Remote)

Offer: PHP 75k per month

Working Hours: Full Time Graveyard Shift (WFH Set Up)

Start Date: TBD


SUMMARY:


This role is pivotal in supporting and enhancing Client's Security Operations Center (SOC). As a SOC Analyst, the focus is on three key areas: 

(1) being the primary entry point for all security alerts, responsible for triaging and ensuring effective alert management, 

(2) actively contributing to the operational effectiveness of the SOC

within Client's managed security services framework; 

(3) playing a critical role in the analysis and resolution

of security alerts, escalations and incidents, working collaboratively with Client Operations teams.


ESSENTIAL RESPONSIBILITIES: 


  • Alert Triage: Acts as the first point of contact for all incoming security alerts from various sources, including SIEM, IDS/IPS, and other security tools. Responsibilities include initial assessment, categorization, and prioritization of alerts based on severity and potential impact.

  • Incident Response Support: Perform initial investigations on security alerts to determine the root cause and potential impact. Escalate alerts, events, and incidents to the appropriate teams for further analysis and remediation.

  • Process Enhancement: Participates in evaluating and enhancing alert management processes, ensuring efficient and effective triage procedures.

  • Security Tools Operation: Involved in the basic operation and configuration of security tools like the Client Security Platform, focusing on alert management and response capabilities.

  • Learning and Development: Actively engages in training programs to improve alert triaging skills and overall SOC knowledge. Stay current on emerging security threats, vulnerabilities, and best practices with active commitment to professional development.

  • Reporting and Documentation: Assists in documenting alert activities and contributes to SOC performance reports, focusing on triage effectiveness and alert resolution.

  • Collaborative Teamwork: Works closely with the SOC team, providing insights and support to enhance team-wide alert management capabilities.


REQUIRED EXPERIENCE:


  • Bachelor's degree in computer science, information technology, or a related field.

  • SOC ANALYST experience MUST be RECENT 

  • 2-4 years in cybersecurity roles within a Security Operations Center (SOC)

  • Experience in handling and triaging security alerts.

  • Must Have experience in SIEM tool (checking logs and figuring out the source of the problem)

  • Familiarity with MITRE ATT&CK Framework.

  • Familiarity with security frameworks and standards such as NIST 800-53, CIS Top 20, etc.

  • Understanding of cloud technologies (AWS, Azure, etc.) and security fundamentals.

  • Knowledge of networking and infrastructure basics.

  • Tools and Technologies:

-Basic proficiency in SIEM systems.

-Exposure to IDP, EDR, and NDR tools.

-Familiarity with network analysis tools like Wireshark or tcpdump.

-Introductory scripting skills in Python, Bash, or PowerShell.

  • Strong organizational and time management skills.

  • Strong analytical and problem-solving skills.

  • Ability to work independently and as part of a team.

  • Excellent communication skills, both written and verbal.

  • Ability to prioritize and manage multiple tasks and projects.


OTHER REQUIREMENTS:


T1 or T2 title will be dependent on experience.

  • Flexibility of schedule is required to meet the demands of the position. 

  • This role will be required to work nights and weekends in rotating shifts to provide 24x7x365 coverage.


PREFERRED CERTIFICATIONS:


One or more of the following certifications are preferred.

• CompTIA – Security

• GSEC – SANS GIAC Security Essentials

• SSCP – Systems Security Certified Practitioner



















Required profile

Experience

Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Problem Solving
  • Communication
  • Analytical Skills
  • Time Management
  • Teamwork
  • Organizational Skills

Related jobs