Senior SOC Analyst - 3rd Shift

job
  • Pyramid Consulting, Inc
Sorry the Job you are looking for is no Longer available

Job Summary
Location
Zebulon ,NC
Job Type
Contract
Visa
Any Valid Visa
Salary
PayRate
Qualification
BCA
Experience
2Years - 10Years
Posted
25 Dec 2024
Share
Job Description

Immediate need for a talented Senior SOC Analyst - 3rd Shift. This is a 18+months contract opportunity with long-term potential and is located in Zebulon ,NC (Onsite). Please review the job description below and contact me ASAP if you are interested.


Job ID:24-54202

Pay Range: $70 - $74/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).

Key Responsibilities:


  • This is a 3rd Shift position (10pm to 8am), Sun-Wed (four 10-hour shifts) in Zebulon, NC as an office-based position.
  • Characterize and analyze alerts to understand potential threats.
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
  • Document and escalate incidents that may cause ongoing and immediate impact to the environment.
  • Provide daily summary reports of events and activity relevant to cyber operations.
  • Perform cyber Operations trend analysis and reporting.
  • Perform thorough and high-quality triage and analysis for all alerts.
  • Demonstrate strong communication skills both written and verbal.
  • Actively engage in team chats, calls, and face to face settings.
  • Constantly contribute to SOC runbooks.
  • Recommend improvements to automations, alert Client, and security controls.


Key Requirements and Technology Experience:


  • Key Skills:SOC (Security Operations Center), NOC (Network Operations Center), Cyber Threat Analysis, Security+, Network+, CySA+, any cloud certifications, etc.
  • Technical experience working in a SOC (Security Operations Center), NOC (Network Operations Center), or similar team.
  • The Cyber Threat Analyst, or SOC Analyst, must have skills in email, log, and network analysis.
  • Knowledge of common IT and security concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important.
  • Experience conducting analysis in AWS or Azure environments.
  • Certifications like the: Security+, Network+, CySA+, any cloud certifications, etc.
  • Ability to solve problems by applying best practices.
  • Demonstrated proficiency utilizing security platforms related to logging, event correlation, incident management, and vulnerability management.
  • Demonstrated teamwork and collaboration skills.
  • Strong time management skills and ability to manage competing priorities effectively.
  • Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.
  • Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.
  • Support a variety of tasks in support of the larger Cybersecurity Mission.
  • Demonstrate the ability to work as a self-starter and acquire new skills quickly.
  • Exemplify the characteristics of a great team player and overall positive mindset.
  • Ability to support an on-call and regular shift within a 24/7 operations environment.
  • Ability to obtain requisite technical certification(s) within six months of hire.
  • Knowledge of cloud fundamentals.
  • Knowledge of general information technology (IT) and cybersecurity.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
  • Knowledge of operating systems, including Windows/Unix ports and services.
  • Knowledge of basic identity and access management concepts.
  • Knowledge of phishing tactics and techniques.
  • Knowledge of cyber threats and vulnerabilities.
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Knowledge of incident response and handling methodologies.
  • Knowledge of countermeasures to address a variety of threats.
  • Knowledge of basic automation, ML, and/or AI possibilities.


Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.


Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.


By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here .

Other Smiliar Jobs
There are no data records to display.