CORVID SOC Analyst T1

CORVID SOC Analyst T1

Location: Brewton, AL

Position Overview:

This SOC Analyst will provide cybersecurity support for Provalus clients within a 24/7 secure environment. This position is perfect for someone with a willingness to acquire in-depth knowledge of network and host security technologies and products (such as endpoint, network, and email security) and continuously improve those skills. The right candidate must have at least 1+ years of current cybersecurity experience OR a recent 4-year degree in cybersecurity and must have the ability to triage security-related issues, document and explain technical details, including incident documentation and related deliverables, and have a team-driven approach towards continual improvement and problem solving.

Key Responsibilities:

  • Assisting with the delivery of assigned SOC deliverables and related log collection and analysis tools.
  • Supporting the creation, documentation, and implementation of security policies, procedures, and practices.
  • Conducting proactive research and investigations to identify threats/vulnerabilities and identify remediation/mitigation procedures.
  • Collaborating and working closely with other IT teams/users to identify and resolve security-related issues.
  • Assisting project teams with performing risk and vulnerability assessments on business processes and infrastructure systems. Working with appropriate parties to develop appropriate resolution and/or mitigation plans.
  • Participate in technical meetings and working groups to address issues related to malware, threats, vulnerabilities, and cybersecurity preparedness.
  • Collaborate with peers and multiple teams to identify improvements and areas for tuning use cases or signatures to enhance monitoring value.

Qualifications:

Apply today if your background includes:

  • 1+ years of incident analysis, security architecture, malware research, SOC, or any other similar incident response experience preferred OR recent 4-year degree in Cyber Security required.
  • Fundamental understanding of security tools such as SIEM, IDS/IPS, web proxies, DLP, CASB, SIEM, DNS security, DDoS protection, and firewalls.
  • Fundamental understanding of cloud security and responding to cloud alerts/events.
  • Knowledge of NIST and MITRE ATT&CK security frameworks.
  • Knowledge of Microsoft Windows systems, including Active Directory and Unix systems.
  • Experience analyzing and inspecting log files, network packets, and any other security tool information output from multiple system types.
  • Familiar with basic reverse engineering principles and understanding of malware, rootkits, TCP/UDP packets, and network protocols.
  • Team-oriented and skilled in working within a collaborative environment.
  • Ability to effectively multi-task, prioritize, and execute tasks in a high-pressure environment.
  • Required flexibility to work nights, weekends, and/or holiday shifts in the event of an incident response emergency.
  • Experience with technical analysis of email headers, links, and attachments to determine if an email is malicious, and then executing remediation techniques to protect the environment.
  • One or more of the following certifications are recommended: CompTIA Security +; CompTIA Network +; Information Systems Security Professional (CISSP); SANS-GIAC certification (Security Essentials/GCIH, GCED, GCIA, GNFA); EC-Council (CEH).

Recruiter: Taylor Masters | taylormasters@provalus.com

Applications will be accepted through July 11th

Apply