SOC - Security Specialist Level 3

Virtual Location, United States

Logicalis

Elevate your business with Logicalis, the top IT solutions and managed services provider in Australia. Explore our offerings and start your journey to success!

View all jobs at Logicalis

Apply now Apply later

Job Purpose:

Part of the Logicalis Managed Security team, the Security Senior Analyst role is responsible for

managing services for Managed Security Service customers. The Security Specialist has the remit

of assessing, discovering and directing remediation of security threats & vulnerabilities within client

environments whilst working as part of a managed security team on various cyber security projects

and tasks.

This role involves working at all levels with Solution Architects, Development Operations, Engineers, SOC Analysts, clients and other stakeholders in building and managing security architecture and systems which are kept up-to-date and relevant in the rapidly evolving Managed Security Services industry.

This is a senior technical role and the role holder is expected to provide 3rd and 4th line support for

the current service platforms and services as well as supporting, mentoring and coaching

colleagues. In addition, there will be a requirement to liaise with channel partners and vendors..

Key Accountabilities:

  • Handle internal and client escalations by engaging with key stakeholders

  • Follow & oversee that the team follows published SOC policies and procedures

  • Be a subject matter expert across Managed Security Service and be able to clearly articulate deliverables, limitations, feasibility, etc.

  • Thorough experience of the configuration, tuning and maintenance of SOC tools to improve detection capability and building re-usable visualisations / dashboards for security alert triage, threat hunting and similar use cases, etc.

  • Develop Standard Operating Procedures (SOPs) and use cases for monitoring and handling different types of security events

  • Threat intelligence gathering to ensure that detection methods are effective against current threats

  • Hunt for suspicious activity based on anomalous activity.

  • Handling events as part of the Security Incident Management Process

  • Work with both internal and external partners to investigate and advise on security incidents and anomalies

  • Prepare detailed reports, providing information on findings, status and progress of investigations, as well as vulnerability and risk factors

  • Serve as the senior technical escalation point and mentor for colleagues.

  • Produce incident response playbooks to drive a consistent approach to handling common incidents and improve operational processes.

  • Analysing structured security log data through the creation of aggregated / correlated reports or visualisations.

  • Identify and implement opportunities for innovative and continuous improvement

  • Lead on customer incident response investigations and containment of threats, advising on remediation

  • Participate in the Security Operations Centre on-call rotation

Skills and Attributes for Success

  • Excellent technical skills, knowledge and understanding of the Logicalis Managed Security Services portfolio, IT Applications, Networking and infrastructure

  • Demonstrable ability to think beyond the immediate situation and use critical thinking, context and judgment in the analysis of complex data sets and events. Actions will vary but most often will require development of a course of action or response to identified threats

  • Ability to work under pressure including crisis situations while maintaining a high degree of attention to detail

  • Experience responding to customer requests including senior management and executives

  • Ability to quickly learn and adapt to new technologies and processes in a rapidly changing environment

  • Excellent written and oral communication skills

  • Self-motivated to improve knowledge and skills

  • People orientated

  • Goal and outcome focused

  • Clear communicator

  • Positive “can-do” attitude

  • An example of integrity

  • A mind-set of continual service improvement

  • Excellent inter-personal skills

Qualifications & Experience

  • Must meet or be eligible to obtain U.S. Government Security Clearance

  • Typically 5+ years experience in IT Security including security operations and being a Sr/lead analyst in a SOC/MSSP or mature internal team

  • Analysing & reviewing security logs from a range of sources, including SIEM - ideally Microsoft Sentinel, Splunk (Arcsight/Qradar/Logrhythm etc), IPS/IDS, Endpoint Security (e.g. Carbon Black); Windows Eventlog

  • Threat Intelligence - in the context of using it in a Security Operations environment

  • Securing services migrated to cloud platform (AWS/AZURE etc) preferred

  • Industry recognised certifications such as: SANS GIAC GCIA, GCIH, GCFA, GNFA, GCTI, GREM or CEH, CISSP etc

  • A related professional certification, for example; CISSP, CISM, CISA

  • Solid IT and/or technology background

  • Awareness of industry standards – PCI-DSS, ISO 27001, GPG 13 etc. etc.

  • Awareness of common exploits and vulnerabilities

  • Solid network engineering and server architecture awareness

  • Previous hands on experience in network/server and security operational roles

Salary Compensation Range:  $90,300 to $121,900

Apply now Apply later
Job stats:  0  0  0

Tags: ArcSight AWS Azure Carbon Black CEH CISA CISM CISSP Clearance Cloud Endpoint security Exploits GCFA GCIA GCIH GCTI GIAC GNFA GREM IDS Incident response IPS ISO 27001 LogRhythm Monitoring QRadar SANS Security Clearance Sentinel SIEM SOC Splunk Threat intelligence Vulnerabilities Windows

Perks/benefits: Career development Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.