SOC Analyst

Petah Tikva, Center District, IL

Citadel

מבדקי חדירה מבדקי חדירה ייעוץ

View all jobs at Citadel

Apply now Apply later

Description

Work in shifts 24/7


·      Real-time monitoring (SIEM Splunk)

·      Monitoring of security cases received through alerts in security tools.

·      Performing level 1 triage of incoming issues (initial determination of incident risk and damage). 

·      Assessing and prioritizing cases and security incidents.

·      Notifying appropriate contacts for security events and response, according to escalation appendix.

·      Working on queue according to severity assigned to ticket.

·      Escalating issues to Tier II or management when necessary, according to escalation appendix.

·      Working closely with the other teams to assess risk and provide recommendations for improving our security posture.

      Cyber news collection, analysis, distribution.

·      Updating the Knowledgebase.

·      Vulnerability assessment using the vulnerability management scan engine.

·      Emergency alerts & warnings.

·      Closing security incident cases.


Requirements

General knowledge of:

· SIEM - Splunk - A Must

·  Creating Playbooks

·  Network

· Security

· Incident Response

· Cyber threats

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Incident response Monitoring SIEM SOC Splunk Vulnerability management

Region: Middle East
Country: Israel

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.