Job Description
Top Skills:
1. Experience in Incident Handling or Incident Response
2. SOC Monitoring Experience
3. Proactive Threat Hunting Experience
4. Centralized Log Management Experience (a significant differentiator)
About the Role:
We are seeking a dedicated and proactive Tier 3 SOC Analyst to join our dynamic Security Operations Center (SOC) team. In this hands-on role, you will play a vital part in safeguarding our systems and networks, collaborating with a passionate team committed to information security. As we transition responsibilities from our Governance, Risk, and Compliance (GRC) team to dedicated SOC analysts, this is a fantastic opportunity to contribute to our security initiatives and make a meaningful impact.
What You'll Do:
- Monitor alerts and conduct proactive threat hunting to identify and mitigate security vulnerabilities within our organization.
- Spend approximately 50% of your time addressing security gaps, including enhancing baseline security, firewall deployments, and log filtering.
- Dedicate 25% of your time to proactive threat hunting activities, with the remaining 25% allocated to miscellaneous tasks.
- Work with Centralized Log Management tools (we use Snare but are open to your preferred tool) to enhance our monitoring capabilities.
- Assist in compliance efforts related to MARS-E and HIPAA regulations.
Key Responsibilities:
- Assess and evaluate our information and cyber security solutions and processes, providing technical advisory to enhance the design and implementation of security technology systems.
- Mentor and guide junior analysts (Security Analyst I and II) in identifying and addressing security risks while leading responses to information security issues.
- Collaborate closely with the Office of Information Assurance (OIA) and interact with technical staff, business unit representatives, stakeholders, and vendors.
What We're Looking For:
The ideal candidate will possess:
- Foundational knowledge of IT systems' security, network security, and administrative tasks.
- Strong communication skills, both written and verbal, with a willingness to interact with various stakeholders.
- A proactive and collaborative approach, ready to learn and coach others.
- Knowledge or experience in Cyber Threat Response, Incident Handling, Cyber Security Operations, and Penetration Testing.
Technical Knowledge:
- Familiarity with operating systems (e.g., Android, iOS, Linux, Windows) and security technologies, including firewalls and IDS/IPS.
- Experience with Security Information and Event Management (SIEM) systems and vulnerability assessments.
- Understanding of regulatory policies and standards (e.g., NIST, COBIT, FedRAMP).
Daily Duties:
1. Support day-to-day SOC monitoring activities, tools, and processes.
2. Provide hands-on support for OIA systems and software.
3. Conduct specialized threat hunts for evidence of compromise.
4. Monitor security technologies for alerts and investigate incidents.
5. Analyze anomalous activity and potential threats to connected resources.
6. Collaborate with agency staff and stakeholders to support security and compliance efforts.
7. Perform other duties as assigned.
Team Environment:
This is an excellent opportunity for those looking to gain mentoring experience. In this role, you will have the chance to guide and develop SOC I and SOC II employees. Your work will significantly impact the citizens of South Carolina by helping to prevent data breaches and protect sensitive medical and personal information.
Join a supportive, family-friendly team environment where management emphasizes coaching rather than micromanaging. Our small, diverse team of 15-20 professionals values collaboration and fosters a fun workplace culture.
Employment Type: Full-Time
Salary: $ 40,000.00 140,000.00 Per Year
Job Tags
Full time,