SOC Analyst

  • San Jose, CA
  • Posted 3 days ago | Updated 2 days ago

Overview

On Site
$50 - $70
Contract - W2
Contract - 12 Month(s)

Skills

SOC
SIEM
SQL
Threat
Security
incidence

Job Details

Greetings from Flexton!

Hope you are doing great today!

One of my clients is looking for SOC Analyst::W2@ San Jose, CA please share me your updated resume and desire rate for this position.

Job Description:
Role: Security Operations Center (SOC) support, cyber analysis, scripting, and automation
Roles and Responsibilities:

  • Security Operations Center (SOC) support, cyber analysis, scripting, and automation.
  • Cyber analysis Splunk Queries and SQL for analysis of log data and Analytics.
  • Should have some scripting or coding experience in any language. Unix Shell, Python, JavaScript, or any other.
  • Identify and mitigate information-security threats.
  • Solve complex security problems
  • Defend and respond daily to keep eBay s critical information assets away from threats and hackers.
  • Extensive experience providing analysis and trending of security log data from many heterogeneous security devices.

Detail job description:
Must demonstrate expert knowledge in one (1) or more of the following areas:

  • Incident Response, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis
  • Core Job Functions Include:
  • Investigations Investigating computer and information security incidents to determine extent of compromise to information and automated information systems
  • Escalations Responding to escalated events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce, and web-based systems.
  • Research Researching attempted or successful efforts to compromise systems security and designs countermeasures.
  • Education - maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
  • Communications Provides information and updates to shift leads & leadership, creates pass-downs for next shift, work closely with supporting teams, provide feedback for new security policy and standards, engage with other teams and adjacencies through email and conference calls.
  • Digital Forensics As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country law
  • Coverage Must be willing to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10-hour shifts with four days on, three (3) days off and possible rotations across Day, Swing, and Graveyard shifts as needed.

To be successful in this position, you should be proficient with:

  • Incident Response Getting people to do the right thing in the middle of an investigation.
  • Offensive Techniques Penetration testing, IOCs, and exploits at all layers of the stack.
  • Logs - you should be comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats.
  • System Forensics Basic understanding of image acquisition techniques, memory forensics, and the like.
  • Networking Fundamentals - TCP/IP Protocols (HTTP, DNS, FTP, DHCP, ARP, etc.), and Wireshark/TCPDump.
  • Scripting Should be familiar with scripting in at least one of the following: python, perl or a similar language.
  • Risk Analysis Taking a vulnerability in a particular environment and understanding the practical associated risk.

Qualifications:

  • Bachelor s degree in computer science, Engineering, Information Technology, Cybersecurity, or a related field.
  • Minimum three (3) years of professional experience in incident detection and response, malware analysis, or digital forensics.

Must have at least one (1) of the following certifications:

  • SANS GIAC: GCED, GCIA, GPEN, GWAPT, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON, GCIH
  • ISC2: CCFP, CCSP, CISSP
  • Cisco: CCNA, CCNP
  • CERT: CSIH
  • EC Council: CEH, ENSA, CNDA, ECSS, ECSP, ECES, CHFI, LPT, ECSA, or ECIH
  • Offensive Security: OSCP, OSCE, OSWP and OSEE
  • Digital Forensics: EnCE, CB, MiCFE, ACE, GCFA, GCFE

In addition, a minimum of one (1) year of specialized experience in one or more of the following areas:

  • Security Assessment or Offensive Security
  • Application Security
  • Security Operations Center/Security Incident Response
  • Cyber intelligence Analysis
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.