Security Operation Center Analyst - Houston, United States - Motion Recruitment

    Motion Recruitment background
    Full time
    Description
    A Security Operations Center (SOC) Analyst plays a crucial role at the Cybersecurity company that we are working with. Efforts to protect its systems, networks, and data from cyber threats. You will be responsible for monitoring, detecting, and responding to security incidents and events within the organization's IT infrastructure. You will work closely with the SOC team to ensure the overall security posture of the company and its clients.

    Responsibilities:
    1. Security Monitoring: Monitor security event logs and alerts from various sources, including intrusion detection and prevention systems (IDS/IPS), firewalls, and security information and event management (SIEM) systems.
    2. Incident Detection and Response: Analyze security events and alerts to identify potential security incidents, assess their impact, and initiate the appropriate response measures. This includes investigating and triaging incidents to determine the severity and appropriate actions for containment, eradication, and recovery.
    3. Threat Intelligence: Stay updated on the latest cybersecurity threats, vulnerabilities, and industry trends. Utilize threat intelligence feeds and tools to proactively identify potential threats and enhance the organization's security posture.
    4. Incident Analysis and Reporting: Conduct in-depth analysis of security incidents, including root cause analysis and post-incident reports. Collaborate with other teams, such as incident response and forensic teams, to gather relevant information and contribute to incident resolution and prevention efforts.
    5. Security Tools Management: Manage and maintain security tools and technologies used within the SOC, such as SIEM, IDS/IPS, endpoint detection and response (EDR) systems, and threat intelligence platforms. Configure, tune, and optimize these tools to ensure accurate detection and response to security events.
    6. Incident Handling and Escalation: Coordinate incident response efforts with relevant stakeholders, including IT teams, management, and external partners. Escalate incidents to higher-level teams or external organizations as required, ensuring timely response and resolution.
    7. Vulnerability Management: Assist in vulnerability scanning and assessment activities. Analyze vulnerability scan results, prioritize remediation efforts, and work closely with the IT team to mitigate identified vulnerabilities.

      Requirements:
      • Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience).
      • Strong knowledge of network protocols, operating systems, and security technologies.
      • Familiarity with security frameworks and industry standards (e.g., NIST, ISO
      • Experience with security monitoring tools, SIEM platforms, and intrusion detection/prevention systems.
      • Understanding of incident response methodologies and best practices.
      • Knowledge of common cybersecurity threats, attack vectors, and mitigation techniques.