Epicareer Might not Working Properly
Learn More

SOC Analyst II

  • Full Time, onsite
  • Kforce Technology Staffing
  • On Site, United States of America
Salary undisclosed

Checking job availability...

Original
Simplified
RESPONSIBILITIES:
Kforce has a client in Orlando, FL that is seeking a SOC Analyst II.

Summary:
As a member of the professional staff, the SOC Analyst contributes general knowledge and skill in a discipline area to support team and/or department objectives. Generally, the SOC Analyst works under limited supervision, but within established guidelines, producing and analyzing more complex business information to assist in the decision-making process.

Responsibilities:
* Assists more senior associates in achieving business results by: identifying opportunities to enhance the effectiveness of business processes; Participating in setting department operating plans; Achieving results against budget within scope of responsibility
* Monitors security tools for alerts and follow defined processes to remediate
* Resolves security incident tickets according to established service level agreements
* Evaluates and improves existing detection rules for continuous improvement
* Works with security incident response team to investigate potential security breaches
* Maintains process documentation such as Standard Operating Procedures
* Works with security incident response team to investigate potential security breaches
* Provides feedback to other security teams on potential security enhancements based on detected events
* Proactively searches IT systems for novel and hard-to-detect attacks and hacking techniques based on Senior Threat Intelligence Analyst findings
* Provides technical and analytical support of technologies that support network and system security monitoring at an enterprise level
* Communicates with system owners, custodians, and IT contacts to pursue security testing activities, including obtaining access to systems, digital artifact collection, and containment and/or remediation actions
* Assists in analyzing findings and document results and produce reports

REQUIREMENTS:
Preferred certifications:
* Splunk Core Certified User
* Splunk Certified Cybersecurity Defense Analyst
* Certified Cyber Threat Hunter (CCTH)
* GIAC Certified Intrusion Analyst (GCIA)
* Certified Ethical Hacker (CEH)

* 3-5 years of experience in cyber security field
* 1+ years of experience in a Threat Intelligence or Threat Hunter role
* Analytical and strategic-thinking
* Exceptional analytical skills to interpret complex data and identify sophisticated threats.
Technical
* Basic understanding of cyber threat hunting
* Basic understanding of open-source intelligence (OSINT), industry reports, and internal data
* Demonstrated understanding of the threat intelligence life cycle, network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs)
* Experience with one or more of the following tools: Email/Phishing, DLP, IDS/IPS and/or, WAF
* Knowledgeable in security incident response process, network forensics and host-based forensics
* Good Knowledge of EDR tools such as CrowdStrike Falcon, Carbon Black, or similar
* SIEM Platforms: In-depth experience with platforms like Splunk, QRadar, or Sentinel
* Experience in creating logging standards that align with various compliance and best practice requirements to include (but not limited to) Sarbanes Oxley, PCI, and the Mitre Att&ck framework.
* Forensic Tools: Basic understanding of forensic tools such as EnCase, FTK, or SIFT Workstation

The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.

We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.

Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.

This job is not eligible for bonuses, incentives or commissions.

Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job