Epicareer Might not Working Properly
Learn More

Security Operations Center Analyst

Salary undisclosed

Apply on


Original
Simplified

Pivotal Partners is exclusively partnered to scale a FedRAMP market acceleration platform, whom are hiring one of their founding SOC Analysts.

Backed by one of the largest VC's in the Security space, we are tackling one of the largest problems within the Public Software space.

You will do the following:

  • Manage the continuous monitoring of our GovCloud’s platform using a variety of industry-leading and proprietary monitoring and scanning technologies.
  • Support all policies and procedures required to achieve and maintain FedRAMP, StateRAMP and other compliance standards.
  • Contribute to the development of the continuous monitoring of our Azure platform using a variety of industry-leading and proprietary monitoring and scanning technologies.
  • Serve as the initial triage for a team of SOC analysts providing 8×5 monitoring and incident response.
  • Work with the Principal SOC Analyst to develop and maintain analytics to identify MITRE ATT & CK techniques and misalignment with NIST 800-53 requirements.
  • Work with the SOC Manager to develop standard operating procedures and identify gaps in detections and preventions with MITRE ATT&CK, MITRE D3FEND, NIST 800-53 Obtain appropriate certifications (cloud security certifications as an example) for technical and security operations-related professional growth.

We need a background with:

  • Over 3 years of proven experience working in a Security Operations Center (SOC), with expertise in securing cloud-based workloads, Windows, and Linux environments, particularly within frameworks like FedRAMP or similar NIST standards.
  • Proficient in using SIEM and SOAR technologies for reporting and analysis, with significant experience in Splunk.
  • Skilled in implementing endpoint security solutions, such as TrendMicro or equivalent tools.
  • Hands-on experience with DAST and IAST for application scanning, including Accunetix, as well as container scanning tools like BlackDuck and Trivvy.
  • Expertise in infrastructure and database scanning using tools like Tenable or similar, along with experience in cloud monitoring through Azure Monitor and AWS Config.