The Tier 2 SOC Analyst will perform analysis regarding potential Cybersecurity Threats, serving as an escalation point for incidents affecting the client. This includes identifying the type of incident, determining the severity of the attack, and applying incident response measures based on Playbooks. Working with client’s security teams and system owners, the Tier 2 Analyst will suggest the appropriate actions for containment and eradication of security incidents, in a timely and accurate fashion.
Furthermore, the Analyst should be up to date with the current trends regarding active exploitations, vulnerabilities, and attack methods to create detection rules proactively for the client.
Key Responsibilities
· Act as an escalation point for Tier 1 SOC Analysts
· Provide teaching/mentoring to Junior Analyst Team Members
· Perform investigations and Threat Hunting as needed
Communicating objective findings (written and oral) to both technical and business orientated teams
· Develop New Use Cases based on Trends and Threat Intelligence Platforms
· Develop New Use Cases for new Technologies adapted by the Client
· Fine Tune existing Use Cases to reduce False Positives
· Define and mature ‘playbooks’ for response to cyber threats
Requirements
Basic Qualifications
Preferred Skills
· Vendor Specific Certification (IBM, Microsoft) related to Incident Analysis
· Security Oriented Certifications (CySa+, GCIH, etc.)
Benefits
Copyright © 2024 Grabjobs Pte.Ltd. All Rights Reserved.