SOC - Security Specialist Level 3 - XCMHH_9-5953
This job was posted by https://illinoisjoblink.illinois.gov : For more
information, please see: https://illinoisjoblink.illinois.gov/jobs/12573361 **Job Description**
**Job Purpose:**
Part of the Logicalis Managed Security team, the Security Senior Analystrole is responsible for
managing services for Managed Security Service customers. The SecuritySpecialist has the remit
of assessing, discovering and directing remediation of security threats& vulnerabilities within client
environments whilst working as part of a managed security team onvarious cyber security projects
and tasks.
This role involves working at all levels with Solution Architects, Development Operations, Engineers, SOC Analysts, clients and otherstakeholders in building and managing security architecture and systems
which are kept up-to-date and relevant in the rapidly evolving Managed
Security Services industry.
This is a senior technical role and the role holder is expected toprovide 3rd and 4th line support for
the current service platforms and services as well as supporting, mentoring and coaching
colleagues. In addition, there will be a requirement to liaise withchannel partners and vendors..
**Key Accountabilities:**- Handle internal and client escalations by engaging with key
- Follow & oversee that the team follows published SOC policies and
- Be a subject matter expert across Managed Security Service and be
- Thorough experience of the configuration, tuning and maintenance of
visualisations / dashboards for security alert triage, threat
hunting and similar use cases, etc.
- Develop Standard Operating Procedures (SOPs) and use cases for
- Threat intelligence gathering to ensure that detection methods are
- Hunt for suspicious activity based on anomalous activity.
- Handling events as part of the Security Incident Management Process
- Work with both internal and external partners to investigate and
- Prepare detailed reports, providing information on findings, status
factors
- Serve as the senior technical escalation point and mentor for
- Produce incident response playbooks to drive a consistent approach
- Analysing structured security log data through the creation of
- Identify and implement opportunities for innovative and continuous
- Lead on customer incident response investigations and containment of
- Participate in the Security Operations Centre on-call rotation
- Excellent technical skills, knowledge and understanding of the
- Demonstrable ability to think beyond the immediate situation and use
data sets and events. Actions will vary but most often will require
development of a course of action or response to identified threats
- Ability to work under pressure including crisis situations while
- Experience responding to customer requests including senior
- Ability to quickly learn and adapt to new technologies and processes
- Excellent written and oral communication skills
- Self-motivated to improve knowledge and skills
- People orientated
- Goal and outcome focused
- Clear communicator
- Positive /"can-do/" attitude
- An example of integrity
- A mind-set of continual service improvement
- Excellent inter-personal skills
**Qualifications & Experience**
Must meet or be eligible to obtain U.S. Government Security Clearance
Typically 5+ years experience in IT Security including securityoperations and being a Sr/lead analyst in a SOC/MSSP or mature internal
team
Analysing & reviewing security logs from a range of sources, includingSIEM - ideally Microsoft Sentinel, Splunk (Arcsight/Qradar/Logrhythm
etc), IPS/IDS, Endpoint Security (e.g. Carbon Black); Windows Eventlog
Threat Intelligence - in the context of using it in a SecurityOperations environment
Securing services migrated to cloud platform (AWS/AZURE etc) preferred
Industry recognised certifications such as: SANS GIAC GCIA, GCIH, GCFA, GNFA, GCTI, GREM or CEH, CISSP etc
A related professional certification, for example;