Match score not available

Tier 2 SOC Analyst

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Bachelor's degree in Computer Science, Cyber Security, Information Technology or related discipline, or equivalent experience., 4-6 years of experience in Information Technology, particularly in a SOC environment., Strong analytical and critical thinking skills, with a focus on threat detection and response., Familiarity with SIEM tools, particularly Splunk, and network security operations..

Key responsabilities:

  • Perform Tier 2 SOC follow-up and remediation on escalated incidents.
  • Conduct analysis using SIEM systems and validate threat signatures.
  • Document existing and future processes through playbooks and facilitate process review meetings.
  • Analyze anomalous user behavior and respond to various security incidents.

Lynx Technology Partners, LLC logo
Lynx Technology Partners, LLC SME https://www.lynxtechnologypartners.com/
51 - 200 Employees
See all jobs

Job description

This is a remote position.

PLEASE NOTE THIS POSITION WILL ALLOW CONSULTANT TO WORK REMOTELY. HOWEVER, DUTIES WILL REQUIRE CONSULTANT TO WORK ONSITE 3 DAYS PER WEEK. THEREFORE, WILL BE CRITICAL FOR THE CONSULTANT TO BE LOCAL TO NYC AND ABLE TO TRAVEL TO OUR OFFICE WITHOUT ISSUE, AS NEEDED (AT THEIR OWN EXPENSE).

One of 3 shifts a day in a 24/7 operation (*consultant needs to be flexible enough to fill any of the 3 shifts as needed):
Shift 1 = 12am – 8:30am
Shift 2 = 8am – 4:30pm
Shift 3 = 3:30pm – 12am

SUMMARY OF THE FUNCTION/ROLE:

The IT Cyber Security Operations Monitoring Team is seeking consultants to perform Tier 2 SOC follow-up and remediation activity on escalated incidents. The Tier 2 level Analyst (Senior Analyst) should have the ability to respond to a wide range of escalated Incidents and follow through with incident lifecycle through completion. Some of the areas we are looking for candidates to have experience in include but are not limited to:
  1. SIEM: The ability to conduct correlated searches and analysis utilizing a Security Incident & Event Management system.
  2. Network: The ability to Analyze and dissect packets and validate threat signatures
  3. Endpoint: Ability to perform basic static forensic analysis of Systems and Files
  4. Email: Demonstrated ability to analyze email attributes such as Headers, and the ability to apply appropriate countermeasures to enhance email defense
  5. Cloud: The ability to analyze anomalous detected traffic based on defined attack policies, ability to validate the treat and then determine remediation steps and present findings)
  6. User & Entity Behavior Analytics: demonstrated capability to recognize and respond to various anomalous patterns of User’s and Entity’s activity to detect malicious intent.
  7. Web Application: familiarity with various types of code-based attacks and the ability to detect and respond to them
  8. Data Loss Prevention: Demonstrated capability to analyze DLP events and the ability to detect Data exfiltration through covert channels.
  9. Document As-Is and To-Be playbooks for existing and future process.
  10. Coordinate and facilitate meetings such as process reviews, requirements, and various status reports
RISKS (required by MTA Risk Management):
  • All work when On MTA premises will be desk work only performed within the Cyber Security Operation Center (CSOC) Environment.


Requirements
  • Critical Thinker & Analytical Aptitude
  • SIEM Experience (Splunk)
  • Tier II SOC Incident Handling & Investigation
  • 24/7 Security Operation Center Experience
  • Threat Detection & Response Experience
  • Threat Detection Technologies Experience
QUALIFICATIONS EXPERIENCE & EDUCATION
  • Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations.
  • Organizational, decision making, and communications skills.
  • Knowledge of network security operations with a solid understanding of the technology and attention to detail.
  • Creative problem-solving abilities, coupled with a desire to take on responsibility.
  • Strong team player with the ability to engage and promote a cohesive unit.
  • Ability to handle multiple tasks in a fast-paced environment and prioritize highly varied work in order to maintain required productivity levels.
  • Ability to communicate technical info and ideas so others will understand.
  • Ability to make appropriate decisions considering the relative costs and benefits of potential actions.
  • Ability to apply collaborative skills and traits that create solutions and results to unexpected situations.
  • Bachelor's degree in Computer Science, Cyber Security, Information Technology or related discipline OR a satisfactory equivalent with 4-6 years of Information Technology experience.



Benefits

Lynx offers a comprehensive benefits package, including health and welfare benefits, life insurance, retirement benefits, paid holidays, and remote working options.

Lynx Technology Partners is an Equal Opportunity Employer committed to diversity and inclusion in the workplace. We do not discriminate based on race, color, national origin, religion, sex, pregnancy, marital status, sexual orientation, gender identity, age, physical or mental disability, or covered veteran status.

Join us at Lynx Technology Partners and be part of a dynamic team dedicated to defending against cyber threats and protecting our clients' digital assets.



Salary:

$85,000.00

Required profile

Experience

Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Creative Problem Solving
  • Analytical Skills
  • Decision Making
  • Communication
  • Time Management
  • Teamwork
  • Critical Thinking
  • Organizational Skills

Related jobs