Responsibilities :
- Executes daily operations, responsible for monitoring the security events / alerts / incidents and closing or escalating those as necessary. SOC Analysts update all relevant documentation such as shift logs and tickets.
- Rapidly identify, categorize, prioritize, and triage incidents as the initial step for the enterprise using all available log and intelligence sources.
- Perform initial investigation and triage of potential incidents and escalate or close incidents as applicable.
- Maintain SOC shift logs with relevant activity from analyst shift.
- Document investigation results, ensuring relevant details are passed to the Senior Analysts for final event analysis.
- Manage SOC event and information intake, including gathering intelligence reports, monitoring ticket queues, investigating reported incidents, and interacting with other security and network groups as necessary.
Skills Required : - Splunk
- Microsoft Sentinel
- IBM QRADAR
- LogRhythm
Experience :
Minimum 5 years of relevant experience
3 candidates required, will work in shift hours.
#J-18808-Ljbffr