SOC L0 Analyst
Wroclaw, PL
IBM
For more than a century, IBM has been a global technology innovator, leading advances in AI, automation and hybrid cloud solutions that help businesses grow.At IBM, work is more than a job – it’s a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you’ve never thought possible. Are you ready to lead in this new era of technology and solve some of the world’s most challenging problems? If so, lets talk.
Your Role and Responsibilities
As a L0 Analyst you will deal with cyber security, spam and phishing events as reported by SIEM, TIP, security tools, email, chat, phone calls or direct messages, with the final purpose to identify which event is a cyber security incident and to report GDPR-related events to the DPO.
In your daily work you will review alerts, threat intelligence and security data, identify threats that have entered the network and security gaps and vulnerability currently known. In this role, you will identify events according to documented procedures and industry best practices. You will be required to follow the incident response plan and assist Cyber Threat Response Analysts when necessary.
You will be part of the SOC team that runs 24×7, on a rotating shift schedule.
• First point of contact for cyber security and GDPR-related events
• First point of analysis of threat intelligence reports
• Support investigation of cyber security and GDPR-related incidents
• Conduct events triage
• Conduct spam and phishing analysis and reaction, and provide recommendations for future similar events
• Profile and trend events in the environment to determine if an incident needs to be created
• Provide incident communication and escalation as per the security incident response guidelines
• Create and deliver GDPR-related events reports and notices
• Hunt for suspicious anomalous activity based on data alerts or data outputs from various toolsets
• Escalate IT security tools issues, when necessary
• Create and maintain daily activity log
• Perform administrative tasks as per management request (ad-hoc presentations, trainings, etc.)
• Assist continuous improvement of processes and work with other teams to improve alerts and rules in the incident monitoring systems
Required Technical and Professional Expertise
• At least one year experience in a similar role
• Experience with analyzing network and endpoint traffic
• Exposure to network devices, Microsoft Windows systems, UNIX systems, and other security assessment tools (NMAP, Nessus, Metasploit, Netcat, etc.)
• Experience in threat intelligence report analysis
• Experience with log management and security information management tools
• Experience with SIEM, SOAR, UBA, anti-malware, spam, phishing and TIP tools
• Knowledge of log formats from various log sources
• Knowledge of data protection regulation key principles
• English language at B2 level or above
Preferred Technical and Professional Expertise
• Experience with Splunk Enterprise Security solution (would be an advantage)
• Basic programming skills: Python, C/C++/Perl and other scripting languages (would be an advantage)
• An understanding of contemporary and legacy security technologies (e.g. IDS, Firewalls, IAM, SIEM)
Any of the following certificates will be a nice to have:
• Comptia Sec+, Comptia CySA+, CEH
• Security Essentials – SEC401 (optional GSEC certification)
• Intrusion Detection In Depth – SEC503 (optional GCIA certification)
• Hacker Guard: Security Baseline Training – SEC464
• Advanced Security Essentials – SEC501 (optional GCED certification)
• Hacker Techniques, Exploits & Incident Handling – SEC504 (optional GCIH certification)
Key Job Details
Role:SOC L0 Analyst Location:Wroclaw, PL Category:Consulting Employment Type:Full-Time Travel Required:No Travel Contract Type:Regular Company:(0109) IBM Polska Sp. zo.o. Req ID:742332BR
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: C CEH CompTIA Exploits Firewalls GCED GCIA GCIH GDPR GSEC IAM IDS Incident response Intrusion detection Malware Metasploit Monitoring Nessus Nmap Perl Python Scripting Security assessment SIEM SOAR SOC Splunk Threat intelligence UNIX Windows
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.