Match score not available

Senior Associate - Security Operations Centre Analyst, Cyber Risk

72% Flex
Remote: 
Full Remote
Contract: 
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

Passion for security and problem-solving, Knowledge of incident response processes, Experience with SIEM and EDR, Understanding of various security solutions, Industry certifications like CREST, OSCP.

Key responsabilities:

  • Investigate security events and raise incidents
  • Analyze logs, traffic patterns, provide incident response support
  • Maintain SIEM rules, generate security reports
  • Collaborate with analysts and teams
  • Support multiple customer environments
Kroll logo
Kroll XLarge https://www.kroll.com/
5001 - 10000 Employees
See more Kroll offers

Job description

Logo Jobgether

Your missions

In a world of disruption and increasingly complex business challenges, our professionals bring truth into focus with the Kroll Lens. Our sharp analytical skills, paired with the latest technology, allow us to give our clients clarity—not just answers—in all areas of business. We embrace diverse backgrounds and global perspectives, and we cultivate diversity by respecting, including, and valuing one another. As part of One team, One Kroll, you’ll contribute to a supportive and collaborative work environment that empowers you to excel.
Kroll’s Cyber Risk team works on over 2,000 cases a year, including some of the most complex and highest profile matters in the world. With experts based around the world, supported by ground-breaking technology, we help protect our client’s data, people, operations and reputation with innovative assessments, investigations and intelligence. We are the only company in the world with the expertise and resources to deliver global, end-to-end cyber risk management, supporting organizations through every step of their journey toward cyber resilience.
Clients count on us for quick and expert support in the event of and in preparation against a cyber incident; from incident response to risk assessments, and complex forensics to breach notification and ID theft remediation we help clients – of all sizes – respond with confidence.
At Kroll, your work will help deliver clarity to our clients’ most complex governance, risk, and transparency challenges. Apply now to join One team, One Kroll.

RESPONSIBILITIES:
- Carry out in-depth investigation on security events, raise incidents and support the Incident Management process.
- Provide remote incident response activities and advice to support customers during and immediately after security incidents.
- Respond to system generated alerts, analyze logs and traffic patterns.
- Maintain and improve SIEM correlation rules and Endpoint Protection detections.
- Supporting multiple customer environments concurrently.
- Provide analysis and trending of security log data and network traffic.
- Generate customer facing security reports.
- Integrate and share information with other analysts and other teams.
- Other duties as assigned.
REQUIREMENTS:
- Has a passion for security and enjoys solving problems.
- Experience working with SIEM and EDR systems.
- Good knowledge of Cyber Security Incident Response processes & procedures.
- Excellent knowledge on the fundamentals of Windows and Unix systems.
- Good understanding of host forensics, memory forensics and network forensics.
- In-depth knowledge of the security threat landscape.
- Knowledge of various security methodologies and processes, and technical security solutions.
- Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
- Knowledge of investigation techniques to determine security incidents.
- Ability to multi-task, prioritize, and manage time effectively.
- Strong attention to detail.
- Excellent interpersonal skills and professional demeanor.
- Excellent verbal and written communication skills.
- Excellent customer service skills.
- Industry standard certifications such as: CREST CRT, CREST CCT, OSCP, GCFA, GNFA, GREM.
- 3+ years’ experience as a Cyber Security Analyst or equivalent.
- Experience of working in an MSSP/MDR SOC environment.
In order to be considered for a position at Kroll, you must formally apply via careers.kroll.com
Kroll is committed to equal opportunity and diversity, and recruits people based on merit

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Soft Skills

  • Attention to Detail
  • Interpersonal Skills
  • Verbal Communication in Japanese
  • Customer Service
  • Multi-Tasking
  • Time Management

Go Premium: Access the World's Largest Selection of Remote Jobs!

  • Largest Inventory: Dive into the world's largest remote job inventory. More than half of these opportunities can't be found on standard platforms.
  • Personalized Matches: Our AI-driven algorithms ensure you find job listings perfectly matched to your skills and preferences.
  • Application fast-lane: Discover positions where you rank in the TOP 5% of applicants, and get personally introduced to recruiters with Jobgether.
  • Try out our Premium Benefits with a 7-Day FREE TRIAL.
    No obligations. Cancel anytime.
Upgrade to Premium

Find more Cybersecurity Engineer jobs