CORVID SOC Analyst T1
CORVID SOC Analyst T1
Location: Brewton, AL
Position Overview:
This SOC Analyst will provide cybersecurity support for Provalus clients within a 24/7 secure environment. This position is perfect for someone with a willingness to acquire in-depth knowledge of network and host security technologies and products (such as endpoint, network, and email security) and continuously improve those skills. The right candidate must have at least 1+ years of current cybersecurity experience OR a recent 4-year degree in cybersecurity and must have the ability to triage security-related issues, document and explain technical details, including incident documentation and related deliverables, and have a team-driven approach towards continual improvement and problem solving.
Key Responsibilities:
- Assisting with the delivery of assigned SOC deliverables and related log collection and analysis tools.
- Supporting the creation, documentation, and implementation of security policies, procedures, and practices.
- Conducting proactive research and investigations to identify threats/vulnerabilities and identify remediation/mitigation procedures.
- Collaborating and working closely with other IT teams/users to identify and resolve security-related issues.
- Assisting project teams with performing risk and vulnerability assessments on business processes and infrastructure systems. Working with appropriate parties to develop appropriate resolution and/or mitigation plans.
- Participate in technical meetings and working groups to address issues related to malware, threats, vulnerabilities, and cybersecurity preparedness.
- Collaborate with peers and multiple teams to identify improvements and areas for tuning use cases or signatures to enhance monitoring value.
Qualifications:
Apply today if your background includes:
- 1+ years of incident analysis, security architecture, malware research, SOC, or any other similar incident response experience preferred OR recent 4-year degree in Cyber Security required.
- Fundamental understanding of security tools such as SIEM, IDS/IPS, web proxies, DLP, CASB, SIEM, DNS security, DDoS protection, and firewalls.
- Fundamental understanding of cloud security and responding to cloud alerts/events.
- Knowledge of NIST and MITRE ATT&CK security frameworks.
- Knowledge of Microsoft Windows systems, including Active Directory and Unix systems.
- Experience analyzing and inspecting log files, network packets, and any other security tool information output from multiple system types.
- Familiar with basic reverse engineering principles and understanding of malware, rootkits, TCP/UDP packets, and network protocols.
- Team-oriented and skilled in working within a collaborative environment.
- Ability to effectively multi-task, prioritize, and execute tasks in a high-pressure environment.
- Required flexibility to work nights, weekends, and/or holiday shifts in the event of an incident response emergency.
- Experience with technical analysis of email headers, links, and attachments to determine if an email is malicious, and then executing remediation techniques to protect the environment.
- One or more of the following certifications are recommended: CompTIA Security +; CompTIA Network +; Information Systems Security Professional (CISSP); SANS-GIAC certification (Security Essentials/GCIH, GCED, GCIA, GNFA); EC-Council (CEH).
Recruiter: Taylor Masters | taylormasters@provalus.com
Applications will be accepted through July 11th