Senior Cyber Defense SOC Analyst (L3)
NEW YORK, NY, United States
Full Time Senior-level / Expert USD 125K - 135K
Ascot Group
Ascot Group is a preeminent global specialty risk-assumption organization. Join us on our exciting journey over the next 20 years.This is an opportunity to join Ascot Group - one of the world’s preeminent specialty risk underwriting organizations.
Designed as a modern-era company operating through an ecosystem of interconnected global operating platforms, we’re bound by a common mission and purpose: One Ascot. Our greatest strength is a talented team who flourish in a collaborative, inclusive, and entrepreneurial culture, steeped in underwriting excellence, integrity, and a passion to find a better way, The Ascot Way.
The Ascot Way guides our people and our organization. Our underwriting platforms collaborate to find creative ways to deploy our capital in a true cross-product and cross-platform approach. These platforms work as one, deploying our capital creatively through our unique Fusion Model: Client Centric, Risk Centric, Technology Centric.
Built to be resilient, Ascot maximizes client financial security while delivering bespoke products and world class service — both pre- and post-claims. Ascot exists to solve for our clients’ brightest tomorrow, through agility, collaboration, resilience, and discipline.
About the role:
As part of our 24x7 Cyber Defense function, the Senior SOC Analyst L3 will be responsible for investigating security incidents, improving detection content and supporting the overall monitoring, detecting and cybersecurity incident response activities. This involves working closely with the members of the internal Cyber Resilience team and our Managed Security Service Provider (MSSP).
Acting as an escalation point for L1/L2 SOC analysts, this resource will work within an expanding cybersecurity team, collaborating with cybersecurity managers, IT Infrastructure, and Deskside Support Teams.
You must be detail-oriented, diligent, and capable of managing multiple aspects of the incident response lifecycle simultaneously. You will be supporting a 24X7 Cybersecurity Defense function and will be required to work in shifts that will vary based on operational needs to support the global footprint across the UK and US time zones.
This resource will additionally be responsible for maintaining detection content on the detection tool, (detection rules, log ingestion, parsers, forwarders), maintaining playbooks, SOC documentation and supporting integrations and log sources associated with the overall Cyber Defense solution. This role will be in the office with a hybrid work schedule.
Responsibilities:
- Monitor our security tools to triage and respond to suspicious events and abnormal activities, capable of performing deep-dive incident investigations.
- Serve as a point of escalation for the L1, L2 SOC Analysts, and the point of contact for our MSSP, coordinating response efforts with other groups and stakeholders with varying technical expertise, such as IT, Legal, business etc.
- Develop and implement advanced security protocols and incident response procedures and improve our threat intelligence processes.
- Stay current with evolving threats, vulnerabilities, tools, technologies and threat actor TTPs to help improve detection and response capabilities.
- Provide oversight and governance over the daily operations of the MSSP and SOC team at a global level.
- Mentor and provide training to junior SOC team members.
- Develop and refine standard operating procedures in the form of run books and playbooks for incident response and threat detection. Create and make improvements to procedures and playbooks. Conduct technical analysis, log reviews, and assessments of cybersecurity incidents throughout the incident management lifecycle.
- Work with end users where appropriate on security related incident and request workflow.
- Document and manage incident cases to utilize information for stakeholder engagement to provide insight, intelligent recommendations, risk reporting and lessons learned.
- Work in scheduled shift patterns when required.
- Conduct in-depth security investigations, log analysis, network/email traffic assessment, and evaluate other data sources to identify root causes, assess impact, and gather evidence for response and mitigating actions.
- Implement detection use cases within our SIEM for our expanding estate using appropriate scripting languages.
- Manage log sources, log ingestion volumes, detection content and overall SIEM solution system health, maintenance, and upgrades.
- Assist with additional ad hoc projects as required.
Requirements:
- Cybersecurity related Bachelor’s degree or related field.
- Minimum of 10 years of experience in a security operations role, OC engineering and or a cybersecurity technical engineering role.
- Exposure to building and migrating log sources onto a new SIEM platform, creating detection content, log parsers and detection engineering will be preferred. Alternatively, candidates that have worked in senior technical roles in a Managed Security Service Provider (MSSP) will be preferred.
- Preference will be given to candidates who also have additional technical and cyber-risk certifications covering both defensive and offensive security such as CompTIA Security+, Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), CySA+, CISSP, GSEC, GCIH, CCSP, Microsoft SC-200, CISSP-ISSMP, CTIA, OSCP
- Candidates must have solid experience and knowledge of typical enterprise technologies. On-premises and cloud base Windows and Linux operating systems (OS), Microsoft Azure, M365 and the ability to detect signs of compromise in these systems.
- Possess a growth mindset and is willing to learn how to resolve technical security issues.
- Demonstrate a working and genuine interest and talent in Cybersecurity
- Demonstrate detail orientation and can take a structured approach to procedures and working instructions.
- Work and maintain a calm structured mindset even when under pressure.
- Possess an aptitude for understanding and analysing data when troubleshooting.
- Strong written communication, critical thinking, and analysis skills, including the ability to present potential risks and actual findings to a wide audience. Ability to communicate complex problems to a non-technical audience.
- Must have a working understanding of key security concepts and attack types such as phishing, malware, vulnerabilities, Cyber Kill Chain, and attack stages.
- A strong analytical mindset, capable of digesting a wide range of information to make practical judgements based on available data and context.
- Experience with security tools and technologies, including SIEM, intrusion detection systems, EDR, XDR, log analysis, and malware analysis.
- Understand threat actor tactics, techniques and procedures, have familiarity with the MITRE-ATT&CK Framework and different stages of an attack lifecycle.
- Maintain a desire to keep learning, with a curious and creative growth mindset.
***This position may be filled at a different level, depending on experience***
Compensation
Actual base pay could vary and may be above or below the listed range based on factors including but not limited to experience, subject matter expertise, and skills. The base pay is just one component of Ascot’s total compensation package for employees. Other rewards may include an annual cash bonus and other forms of discretionary compensation awarded by the Company.
The annualized base pay range for this role in the NY Metro area is:
- $125,000 - $135,000.
Company Benefits
The Company provides a competitive benefits package that includes the following (eligibility requirements apply):
Health and Welfare Benefits: Medical (including prescription coverage), Dental, Vision, Health Savings Account, Commuter Account, Health Care and Dependent Care Flexible Spending Accounts, Life Insurance, AD&D, Work/Life Resources (including Employee Assistance Program), and more
Leave Benefits: Paid holidays, annual Paid Time Off (includes paid state /local paid leave where required), Short-term Disability, Long-term Disability, Other leaves (e.g., Bereavement, FMLA, Adoption, Maternity, Military, Primary & Non-Primary Caregiver)
Retirement Benefits: Contributory Savings Plan (401k)
#LI-Hybrid
Tags: Azure CCSP CEH CISSP Cloud CompTIA Cyber defense Cyber Kill Chain EDR GCIH Governance GSEC Incident response Intrusion detection IT infrastructure Linux Log analysis Malware Monitoring Offensive security OSCP Scripting SIEM SOC Threat detection Threat intelligence TTPs Vulnerabilities Windows XDR
Perks/benefits: 401(k) matching Career development Competitive pay Flex hours Flexible spending account Flex vacation Health care Insurance Medical leave Salary bonus Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.