Security Operations Center

✅ Link copied successfully!

Security Operations Center

SOC (Security Operations Center) Analyst Tier 1 ???? 

 

⏱️ Experience 0-1

 

???? As a member of the SOC (Security Operations Center) team, SOC Tier 1 Analyst are Triage Specialists who are responsible for monitoring computer security events in a 24 x 7 Security Operations Center environment. 

You will be the first line of defense in protecting's information systems from internal and external threats.

 

⭕ Essential Responsibilities:

• Monitor and analyze network traffic and security event data.

• Assess the severity of events and incidents. Able to resolve low-severity 

 incidents and perform initial triage for medium- to high-severity incidents.

• Review security events that are gathered in a Security Information and Event 

 Management (SIEM) system.

• Analyze a variety of network and host-based security appliance logs (Firewalls, 

 NIDS, HIDS, Sys Logs, etc.) to determine the corrective or mitigation actions 

 and escalation paths for each incident.

• Understand how to properly implement, utilize, tune, and administer complex 

 security solutions (such as Firewalls, VPN, SIEM, and IDS/IPS solutions).

• Document all activities during an incident and create a final incident report 

 detailing the events of the incident.

• Be available, on-call, to rapidly troubleshoot any problems 

• Provide support as part of an on-call rotation in the Security Operations 

 Center.

 

⭕ Minimum Qualifications:

• Technical Degree

• Clear understanding of networking essentials and OSI or TCP/IP model and 

 protocols

• Knowledge of techniques for analyzing TCP/IP network traffic and event logs

• General Knowledge of network troubleshooting

• Experience working in Linux, Windows, and OSX environments

• Knowledge of IDS software, firewalls, anti-malware, and log event correlation / 

 Security Information and Event Management (SIEM)tools

 

⭕ Preferred Qualifications:

• Basic understanding of Cyber Security essentials

• Basic Understanding of Security Incident Handling and Computer forensics

• Ability to foster and maintain good relationships with colleagues to meet 

 expected customer service levels.

• Ability to multi-task and ability to adapt to changing priorities or processes

• Ability to work in a challenging environment

• Possess one or more of the following certificates

• CCNA

• CCNA Security

• Security+

• GSEC

• CEH

•MCSA

•RHCSA

 

???? ???? If you have the past qualifications, send your CV to " hr@alphads.net " 

???? The company [Alpha defense systems] is in the fifth settlement 

Login First