SOC Analyst
Company | Fortra |
---|---|
Location | United States |
Salary | $60000 – $75000 |
Type | Full-Time |
Degrees | |
Experience Level | Entry Level/New Grad, Junior |
Requirements
- Accreditation in Cyber Security, or relevant certification
- Knowledge in responding to incidents or alerts generated by a SIEM, SOAR, or equivalent tool
- Beginner understanding of cloud environments & infrastructure (preferably AWS)
- Basic experience with IDS, network monitoring and packet analysis tools such as Snort, Suricata, Wireshark or TCPdump
- Basic command of Linux systems administration and working with BASH
- Basic hands on experience configuring Windows or Linux system logging
- Basic understanding of networking including TCP/IP
- Basic understanding of HTTP, SSL/TLS, SOAP, and reverse proxies
- Basic understanding of the OWASP Top 10
Responsibilities
- Utilize comprehensive knowledge of Fortra’s MDR products and services to effectively provide world-class customer experience and security outcomes for customers.
- Protect customers on a global scale through the provision of expert security guidance on existing and emerging cyber security threats.
- Analyze, escalate, and respond to security events, observables and incidents generated by Fortra’s MDR products.
- Conduct Threat Hunting activities across our customer base, identifying threats and observables that contribute to threat intelligence and content management.
- Support customer incident response activities, providing ongoing monitoring of adversaries and guidance for containment, eradication, and recovery
- Tune proprietary security products for customer specific environments to maximize detection fidelity and minimize noise
Preferred Qualifications
-
No preferred qualifications provided.