Tier 2 SOC Analyst - REMOTE

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

5+ years of experience in Security Operations or equivalent role., Proficiency with Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) tools., Experience in mapping detections to common frameworks and risk reduction models., Familiarity with the latest trends in attacker tactics, techniques, and procedures (TTPs)..

Key responsibilities:

  • Create and document internal alert strategies for identifying and prioritizing alerting opportunities.
  • Review and tune alerts to reduce alert fatigue and improve detection accuracy.
  • Act as the main point of contact for the MDR Provider’s Detection team and collaborate with Incident Responders.
  • Perform attack surface reduction and provide vulnerability analysis and reporting.

Binary Defense logo
Binary Defense Computer Hardware & Networking SME https://www.binarydefense.com/
51 - 200 Employees
See all jobs

Job description

Job Type
Full-time
Description


Binary Defense is seeking a client-facing SOC Analyst to serve as a hands-on contributor within a client’s Security Operations function. 


This is a technical position responsible for transforming the client’s detection strategy, organizing detections, tuning rules, and creating and maintaining cross functional feedback loops. Additionally, leading analysis, design, and hands-on analysis and remediation for Attack Surface Reduction functions such as vulnerability management and penetration test remediation.


You’ll play a key role in growing capabilities with leading tools in the client’s environment such as Splunk, Proofpoint, SentinelOne, and more. This role requires deep technical expertise, strong cross-functional communication, and the ability to deliver operational results.


Responsibilities


· Create internal alert strategy and process documentation for how client identifies alerting opportunities, prioritizes based on threat level, with a focus and priority on gaps

· Review alerts that are too noisy to tune and drive down alert fatigue

· Assess alerts that haven’t triggered to determine whether logic needs to 

· Be the main point of contact to the MDR Provider’s Detection team

· Work with the client’s Incident Responders on alert feedback loops; analyze true and false positive alerts

· Create regular reporting cadence for of all detections created, rules tuned

· Contribute to client’s homegrown “Signal to Noise ratio” detection metric

· Coordinate with MDR Threat Hunting team to request and implement Sentinel One STAR rules

· Map detections to standard frameworks such as the Cyber Killchain

· Work with MDR provider on an ongoing tuning of the on-call criteria

· Perform attack surface reduction including full-scope change management, cross functional coordination, enterprise communication planning/execution, execution of changes in support of security remediation

· Provide vulnerability prioritization and analysis, ticketing, reporting, trending, metrics, assistance to patch teams on troubleshooting root cause of patching challenges

· Analyze stale identities and accounts, admin privileges, and recommend and implement improvements


Requirements


· 5+ Years Security Operations or Equivalent Experience

· Experience with Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) tools

· Experience mapping detections to common frameworks and risk reduction models

· Familiarity with the latest trends in attacker TTPs


About Binary Defense


Binary Defense is a trusted leader in security operations, supporting companies of all sizes to proactively monitor, detect and respond to cyberattacks. The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.


With a world-class 24/7 SOC, deep domain expertise in cyber, and sophisticated technology, hundreds of companies across every industry have entrusted Binary Defense to protect their business. Binary Defense gives companies actionable insights within minutes not hours, the confidence in their program to be resilient to ever-changing threats, and the time back that matters most to their business.


Binary Defense is also the Trusted Cybersecurity Partner of the Cleveland Browns and partners with PGA TOUR players. For more information, visit our website, check out our blog, or follow us on LinkedIn.


Binary Defense offers competitive medical, dental and vision coverage for employees and dependents, a 401k match which vests every payroll, a flexible and remote friendly work environment, as well as training opportunities to expand your skill set (to name a few!). If you’re interested in joining a growing team with great perks, we encourage you to apply!

Required profile

Experience

Industry :
Computer Hardware & Networking
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Collaboration
  • Communication
  • Problem Solving

Related jobs