Security Consultant

Remote Home, HW, US, 99999

Atos

Atos is a global leader in digital transformation with 105,000 employees and annual revenue of c. € 11 billion.

View all jobs at Atos

Apply now Apply later

The future is our choice
At Atos, as the global leader in secure and decarbonized digital, our purpose is to help design the future of the information space. Together we bring the diversity of our people’s skills and backgrounds to make the right choices with our clients, for our company and for our own futures.

 

 

Security Analyst - MDR (SOC)

Experience Range: 2-3 years of relevant experience in cyber security.

Required Qualifications:

  • Strong analytical and technical skills in computer network defense operations
  • Incident response Handling (Detection, Analysis, Triage, Recommendations)
  • Performing advance investigation of security incidents (reported by L1 & L2 Analyst) using tools and technologies (Splunk, Paloalto, PPT, Zingbox, EDR etc)
  • Prepare weekly SOC incident debrief for management & client executive summary report.
  • Review and support new use-case & fine tuning, create and maintain process document and SOP.
  • Identifying new use-case scope, finetuning scope and give suggestions. 
  • Identify the devices with no use-case in splunk, SIEM and propose industry based good to have use-cases
  • 24/7 On-Call support for critical incidents, investigate, document the finding and create RCA as applicable.
  • Experience handling high priority Security Incidents
  • Hunting (anomalous pattern detection and content management).
  • Prior experience of investigating security events.
  • Should be able to distinguish incidents as opposed to non-incidents.

 

Desired Qualifications:

• Relevant Certifications: CEH, CISSP, Security+, or related certification.

• Bachelor's Degree in Information Technologies, Cyber Security, or a related field.

  • Experience with some/all: SIEM, SPLUNK, EDR, Phishing tools, SNOW, Infoblox, palo alto, IOTs, Malware investigation, Critical security incident investigation and etc 

 

Key Responsibilities:

• Monitor for threats, analyze, and notify customer.

• Working in a 24x7 Security Operation Center (SOC) environment.

• Security Log analysis to detect attack origin, attack spread, attacker details, incident details.

Incident Response when analysis confirms actionable incident.

• Analyze and respond to previously undisclosed software and hardware vulnerabilities.

• Investigate, document, and report on incident.

• Integrate and share information with other analysts and other teams.

• Other tasks and responsibilities as assigned.

• Interface with customers daily to consult with them on best security practices and help them mature their security posture.

The candidates should have:

• Good verbal & written communication skills

• Good understanding of networking concepts

• Good understanding of Windows and Unix basics

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  6  2  0
Category: Consulting Jobs

Tags: CEH CISSP EDR Incident response Log analysis Malware SIEM SOC Splunk UNIX Vulnerabilities Windows

Perks/benefits: Team events

Regions: Remote/Anywhere North America
Country: United States

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.