What is the role
We currently have a need for a Senior Security Operations Center (SOC) Analyst who will play a pivotal role in monitoring, analyzing, and responding to cybersecurity alerts, ensuring the confidentiality, integrity, and availability of systems and data within a robust Managed Detection & Response (MDR) practice serving New Era's customers. The Senior SOC Analyst will be part of a global Security Operations Center that is responsible for providing 24x7x365 eyes-on-glass support.
Who we are looking for
* 3-5 years' experience in information technology, with 3 of those years being part of a Global SOC .
* Desirable skills in Microsoft Sentinel, Microsoft Defender, CrowdStrike, Sentinel One, Entra ID
* Experience with JIRA service management is a plus
* Strong understanding of monitoring, analyzing, and triaging security events using a SIEM.
* Strong initiative, participation, and willingness to collaborate in team settings.
* Exceptional customer focus and commitment to providing 'white glove' customer service.
* Excellent organizational skills and attention to detail.
* Strong communication skills, both written and oral.
* Ability to work independently, prioritize tasks, and escalate issues when necessary.
* Strong knowledge of malware analysis during incident response investigations.
* Basic understanding of the software development lifecycle
* Bachelor's degree in a technical related field a plus but not required
* Industry recognized certification in cyber security a plus, but not required (e.g. Security+, CC, AWS, Azure certs)
Duties and Responsibilities
· Monitor security systems and tools such as SIEM, EDR, CSPM, and ITSM, and analyze, and respond to security alerts.
· Assist and train junior SOC analysts through the security operations lifecycle as needed.
· Execute playbooks and implement mitigations using SOC tools and technologies.
· Collaborate closely with customers and team members to provide security recommendations, and remediation action items during security events.
· Provide timely and thorough reporting to leadership and MDR customers as necessary.
· Respond to ad-hoc client requests through the MDR customer service platform.
· Contribute to the knowledgebase of playbooks and develop and refine documentation.
· Lead SOC working groups and organizational collaborations of cybersecurity case studies and threat hunts.
· Collaborate with the architecture and engineering teams to assist with use-case/detections development and QA of new detections.
· Brainstorm and implement automations of SOC processes and procedures, and alert lifecycle.
· Perform proactive and reactive threat hunts and report findings to customers and leadership.
· Create metrics and dashboards to illustrate SOC performance, and interesting tidbits to be shared with stakeholders.