To be a key member of the SOC and provide real time threat analysis and detection. Carry out in-depth investigation on security events, raise incidents and support the Incident Management process. Conduct remote incident handling activities and provide security advice to support customers during and immediately after security incidents. Respond to system generated alerts, analyse logs and traffic patterns. Supporting multiple customer environments concurrently. Provide analysis and trending of security log data and network traffic. Generate customer facing security reports. Integrate and share information with other analysts and other teams. Tune and whitelist false positives from our detection rules. Support investigations in Major Incidents. Other duties as assigned
Has a passion for security and enjoys solving problems. Knowledge of the security threat landscape. Good knowledge of Cyber Security Incident Response processes & procedures. Excellent knowledge on the fundamentals of Windows and Unix systems. Good knowledge of the security threat landscape. Knowledge of various security methodologies and processes, and technical security solutions. Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Knowledge of investigation techniques to determine security incidents. Ability to multi-task, prioritize, and manage time effectively. Strong attention to detail. Excellent interpersonal skills and professional demeanour. Excellent verbal and written communication skills. Excellent customer service skills. Ability to work a shift rota. 1-3+ years’ experience as a Cyber Security Analyst or equivalent. Industry recognised security and networking certifications (CCNA, CompTIA Network+, CompTIA Security+, CompTIA CySa+, CREST, GIAC).
Bachelor’s degree in a related field or equivalent experience and knowledge. Experience of working in an MSSP/MDR SOC environment.