Threat Monitoring Analyst – SOC TIER 2

Misión

Responsible for responding to events according to documented procedures and industry best practices. Ideal candidates should be experienced in the areas of networking, client/server technologies, and log file analysis, with the ability to identify false positive and true positive events. Must have experience in Linux and Windows operating systems. Candidates in this role may also be required to follow the incident response plan and assist Santander Response Analysts when necessary. Must display enthusiasm for and interest in Information Security.

Funciones

  • Carry out initial investigation of security incidents
  • Carry out communication and escalation throughout the incident per the CSIRT guidelines or internal process or procedure
  • Carry out a direct communication with data asset owners and business response plan owners during high severity incidents
  • Carry out the hunting for suspicious anomalous activity based on data alerts or data outputs from various toolsets
  • Execute analysis of log files
  • Participate actively in the containment of incidents, even after they are escalated
  • Carry out the escalation of issues when necessary

Requisitos

Education
Technical degree or Computing Module

Other

  • Security Essentials
  • Masters Degree in Cybersecurity or advanced certifications (CISSP, CISM, CISA, GCIH, CRISC, GCFE, SANS, etc.)
  • Intrusion Detection In Depth
  • Computer Forensic Investigation
  • Hacker Guard: Security Baseline Training
  • Advanced Security Essentials
  • Hacker Techniques, Exploits & Incident Handling

Competencies

  • Effective verbal and written communication skills
  • Detail orientated

Technical Knowledge

  • Knowledge of network security zones, firewall, ids
  • Knowledge of log formats for syslog, http logs, db logs and how to gather forensics for traceability back to event
  • Knowledge of packet capture and analysis
  • Ability to make information security risk determinations

Languages
English Advance.

Experiencia

  • Experience with log management or security information management tools
  • Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Net cat)
  • 4 year experience in SOC