Overview
SOC Analyst Tier 1 Jobs in Florham Park, New Jersey, USA at Asembia
Title: SOC Analyst Tier 1
Company: Asembia
Location: Florham Park, New Jersey, USA
Type: Full Time
Category: IT/Tech, Security
Asembia is looking for a meticulous and detail-oriented security analyst to be responsible for monitoring the security systems in our organization. The security analyst’s responsibilities include securing our online and on-premises infrastructures, filtering out suspicious activity, and finding and mitigating security risks before any breaches can occur. You will work inter-departmentally to identify and correct any flaws in our security systems.
To be a successful security analyst, you should have a sound working knowledge of cybersecurity, including intrusionprevention, incidence response, and ethical hacking. You should be detail oriented with stronganalytical skillsand have goodcommunication, interpersonal, andleadershipskills.
Level 1 SOC Analyst Responsibilities
Monitor our SIEM/SOAR platform and respond appropriately to any suspicious or abnormal alerts
Ability to perform initial triage and investigation on an alert and document appropriately
Ability to use multiple data sources andcritical thinkingskills when triaging an alert
Respond and resolve client tickets that come into our ticketing system.
Work with Incident Response to provide insight on investigations.
Engage in a daily knowledge transfer of the activities and events that have transpired
Strongcommunicationskills/written skills
Capable of documenting and following up on Security Incident tickets that are currently open or being worked
Working well with a team
Stay up to date on the most recent threats that have surfaced (CVE’s, Known exploits, etc.)
Work with other security staff and engineers on ongoing issues/projects
Engage in self-study
Required qualifications to be successful in this role:
Graduation with a degree from a university with specialization in Computer Sciences or a related discipline and/or a minimum of three to five (3
– 5) years of directly related experience and demonstrated ability to carry out the functions of the job.
Experience working in an IT Security Operations Center using SANS methodology
Experience and extensive knowledge of Security Information Event Management
Experience in Intrusion Detection orPreventionSystems
Knowledge of: TCP/IP, computer networking, routing and switching
Experience in Windows, Mac, and Linux/UNIX based devices at the System Administrator level
System log forensics (Syslog, Event Viewer)
Strong troubleshooting, reasoning andproblem-solving skills
Team player, excellentcommunication skills, good time management
Organizational skills and the ability to work autonomously with attention to processes
Ability to speak and communicate effectively with peers, management and clients
Ability and experience in writing clear and concise technical documentation
Ability to speak and write fluently in English
Preferred Experience, Skills and Knowledge:
Foundational Networking knowledge TCP/IP, routing, VLANs, knowledge of various protocols
Familiarity with Forensics and being able to spot abnormalities
Knowledge of:
Strong Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data LossPrevention(DLP), Identity and Access Management (IAM) solutions
Vulnerability Knowledge (Difference with CVSS and CVE, what are ways that you can fix vulnerabilities)
Experience with industry leading SIEMS, SOAR’s, EDR’s, NIDS.
Security +, Network +, CCNA, SSCP, OSCP, CC, CISSP, …