We currently have a need for a Senior Security Operations Center (SOC) Analyst who will play a pivotal role in monitoring, analyzing, and responding to cybersecurity alerts, ensuring the confidentiality, integrity, and availability of systems and data within a robust Managed Detection & Response (MDR) practice serving New Era’s customers. The Senior SOC Analyst will be part of a global Security Operations Center that is responsible for providing 24x7x365 eyes-on-glass support.
Who we are looking for
* 3-5 years’ experience in information technology, with 3 of those years being part of a Global SOC.
* Desirable skills in Microsoft Sentinel, Microsoft Defender, CrowdStrike, Sentinel One, Entra ID.
* Experience with JIRA service management is a plus.
* Strong understanding of monitoring, analyzing, and triaging security events using a SIEM.
* Strong initiative, participation, and willingness to collaborate in team settings.
* Exceptional customer focus and commitment to providing 'white glove' customer service.
* Excellent organizational skills and attention to detail.
* Strong communication skills, both written and oral.
* Ability to work independently, prioritize tasks, and escalate issues when necessary.
* Strong knowledge of malware analysis during incident response investigations.
* Basic understanding of the software development lifecycle.
* Bachelor's degree in a technical related field a plus but not required.
* Industry recognized certification in cyber security a plus, but not required (e.g. Security+, CC, AWS, Azure certs).
Duties and Responsibilities
* Monitor security systems and tools such as SIEM, EDR, CSPM, and ITSM, and analyze and respond to security alerts.
* Assist and train junior SOC analysts through the security operations lifecycle as needed.
* Execute playbooks and implement mitigations using SOC tools and technologies.
* Collaborate closely with customers and team members to provide security recommendations and remediation action items during security events.
* Provide timely and thorough reporting to leadership and MDR customers as necessary.
* Respond to ad-hoc client requests through the MDR customer service platform.
* Contribute to the knowledgebase of playbooks and develop and refine documentation.
* Lead SOC working groups and organizational collaborations of cybersecurity case studies and threat hunts.
* Collaborate with the architecture and engineering teams to assist with use-case / detections development and QA of new detections.
* Brainstorm and implement automations of SOC processes and procedures, and alert lifecycle.
* Perform proactive and reactive threat hunts and report findings to customers and leadership.
* Create metrics and dashboards to illustrate SOC performance and interesting tidbits to be shared with stakeholders.
How do your skills match this job?
Your application will include the following questions:
* Which of the following statements best describes your right to work in Australia?
* How many years' experience do you have as a Security Operations Centre Analyst?
* What's your expected annual base salary?
#J-18808-Ljbffr