Overview

SOC Analyst Tier 1 Jobs in Florham Park, New Jersey, USA at Asembia

Title: SOC Analyst Tier 1

Company: Asembia

Location: Florham Park, New Jersey, USA

Type: Full Time

Category: IT/Tech, Security

Asembia is looking for a meticulous and detail-oriented security analyst to be responsible for monitoring the security systems in our organization. The security analyst’s responsibilities include securing our online and on-premises infrastructures, filtering out suspicious activity, and finding and mitigating security risks before any breaches can occur. You will work inter-departmentally to identify and correct any flaws in our security systems.

To be a successful security analyst, you should have a sound working knowledge of cybersecurity, including intrusionprevention, incidence response, and ethical hacking. You should be detail oriented with stronganalytical skillsand have goodcommunication, interpersonal, andleadershipskills.

Level 1 SOC Analyst Responsibilities

Monitor our SIEM/SOAR platform and respond appropriately to any suspicious or abnormal alerts

Ability to perform initial triage and investigation on an alert and document appropriately

Ability to use multiple data sources andcritical thinkingskills when triaging an alert

Respond and resolve client tickets that come into our ticketing system.

Work with Incident Response to provide insight on investigations.

Engage in a daily knowledge transfer of the activities and events that have transpired

Strongcommunicationskills/written skills

Capable of documenting and following up on Security Incident tickets that are currently open or being worked

Working well with a team

Stay up to date on the most recent threats that have surfaced (CVE’s, Known exploits, etc.)

Work with other security staff and engineers on ongoing issues/projects

Engage in self-study

Required qualifications to be successful in this role:

Graduation with a degree from a university with specialization in Computer Sciences or a related discipline and/or a minimum of three to five (3
– 5) years of directly related experience and demonstrated ability to carry out the functions of the job.

Experience working in an IT Security Operations Center using SANS methodology

Experience and extensive knowledge of Security Information Event Management

Experience in Intrusion Detection orPreventionSystems

Knowledge of: TCP/IP, computer networking, routing and switching

Experience in Windows, Mac, and Linux/UNIX based devices at the System Administrator level

System log forensics (Syslog, Event Viewer)

Strong troubleshooting, reasoning andproblem-solving skills

Team player, excellentcommunication skills, good time management

Organizational skills and the ability to work autonomously with attention to processes

Ability to speak and communicate effectively with peers, management and clients

Ability and experience in writing clear and concise technical documentation

Ability to speak and write fluently in English

Preferred Experience, Skills and Knowledge:

Foundational Networking knowledge TCP/IP, routing, VLANs, knowledge of various protocols

Familiarity with Forensics and being able to spot abnormalities

Knowledge of:
Strong Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data LossPrevention(DLP), Identity and Access Management (IAM) solutions

Vulnerability Knowledge (Difference with CVSS and CVE, what are ways that you can fix vulnerabilities)

Experience with industry leading SIEMS, SOAR’s, EDR’s, NIDS.

Security +, Network +, CCNA, SSCP, OSCP, CC, CISSP, …

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.