Job Description:
A top financial services company in Michigan is currently seeking an experienced SOC L2 Analyst to join their team in Detroit or Charlotte.
***This is a Hybrid opportunity requiring the qualified professional to work onsite at least a few days a week.***
Responsibilities: The SOC L2 Analyst will:
- First level response for real time security alerts and events
- Assist the Incident Response team in handling security events / incidents
- Perform complex security investigations and root cause analysis
- Data mining through use of SIEM or other data analytics solutions
- Perform phishing investigations and response
- Report generation around security events and metrics
- Ensure that all security events are properly documented/tracked to meet audit and legal requirements
- Develop documentation in support of response processes and/or procedures
- Determine level of event severity and escalate as necessary
- Participate in a rotating On-Call schedule for after hours information security events / incidents
Qualifications:
- Azure/AWS security, GCIA, GCIH, or other GIAC certifications preferred
- Practical understanding of network protocols and operating systems
- Broad understanding of security mitigation solutions at all layers
- Minimum of four years information security specific experience
- Bachelor's degree in information systems or equivalent experience
- Ability to analyze large data sets to identify trends/anomalies indicative of malicious activity
- Good understanding of application logic flow
- Understanding or background in code development
- Awareness of the current threat landscape
- Self-driven and motivated with a strong passion for cybersecurity
- Excellent verbal and written communications skills
- Excellent problem solving and troubleshooting skills with a strong attention to detail
- Ability to interact with personnel at all levels across the organization and to comprehend business imperatives
- Ability to thrive in a fast-paced environment and capable of working under pressure