A top financial services company in Michigan is currently seeking an experienced SOC L2 Analyst to join their team in Detroit or Charlotte.
***This is a Hybrid opportunity requiring the qualified professional to work onsite at least a few days a week.***
Responsibilities:
The SOC L2 Analyst will:
- First level response for real time security alerts and events
-
Assist the Incident Response team in handling security events / incidents
-
Perform complex security investigations and root cause analysis
-
Data mining through use of SIEM or other data analytics solutions
-
Perform phishing investigations and response
-
Report generation around security events and metrics
-
Ensure that all security events are properly documented/tracked to meet audit and legal requirements
-
Develop documentation in support of response processes and/or procedures
-
Determine level of event severity and escalate as necessary
-
Participate in a rotating On-Call schedule for after hours information security events / incidents
Qualifications:
-
Azure/AWS security, GCIA, GCIH, or other GIAC certifications preferred
-
Practical understanding of network protocols and operating systems
-
Broad understanding of security mitigation solutions at all layers
-
Minimum of four years information security specific experience
-
Bachelor's degree in information systems or equivalent experience
-
Ability to analyze large data sets to identify trends/anomalies indicative of malicious activity
-
Good understanding of application logic flow
-
Understanding or background in code development
-
Awareness of the current threat landscape
-
Self-driven and motivated with a strong passion for cybersecurity
-
Excellent verbal and written communications skills
-
Excellent problem solving and troubleshooting skills with a strong attention to detail
-
Ability to interact with personnel at all levels across the organization and to comprehend business imperatives
-
Ability to thrive in a fast-paced environment and capable of working under pressure