SOC Analyst / Event Monitoring

Posted on 19 August 25 by Michael Leizear

  • Herndon, VA
  • $ - $
Logo

Powered by Tracker

Job Description

Security Analyst

Required Skills:
1-3 years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis.
• Experience using SIEM and EDR technologies to support investigations.
• Incident response framework knowledge and experience.
• Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks.
• Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.).
• Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to: Firewalls (FWs), Intrusion detection system (IDS)."

Day-to-day Responsibilities:
Monitor and analyze security events and alerts reported by the Client SIEM on a 24x7x365 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate Client policy.

Education: High School Diploma or higher

Job Information

Rate / Salary

$ - $

Sector

Not Specified

Category

Not Specified

Skills / Experience

Not Specified

Benefits

Not Specified

Our Reference

JOB-5265

Job Location