Security Operations Center Advisor, Cyber Defense - Google
Not available, MO
About the Job
Minimum qualifications:
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
- 2 years of experience working as a SOC analyst in malware research, threat hunting, or similar role working with Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) technologies.
- Experience using multiple operating systems, directory service software, and document, spreadsheet, and presentation software.
- Experience leading incident response activities.
Preferred qualifications:
- Understanding of security controls for common platforms and devices, including Linux and network equipment.
- Understanding of operating systems, including Linux.
- Knowledge of scripting languages (e.g., PowerShell and Python).
- Ability to simplify and communicate complex ideas.
- Excellent communication and people management skills.
About the job
As a Security Operations Center (SOC) Advisor, you will be responsible for enabling efficient and accurate incident response activities and daily tasks within a Cyber Defense Center (CDC). You will collaborate with multiple cross-functional teams like Mandiant Architects, Mandiant Engineers, client Information Technology (IT) resources, and other business resource owners, to define requirements and deliver recommendations focused on incident response activities to support the client's CDC. In addition, you may be responsible for the analysis, response, containment, remediation, and long-term improvement of a client's SOC in order to maintain and transform incident detection and response capabilities.
In this role, you will be a member of a highly technical team in a rapidly changing environment, be experienced in administering a variety of information security technologies, excited to learn new emerging technologies, and passionate about protecting customer data and corporate assets from the diverse threats facing multiple industries.
Responsibilities
- Identify challenges in customer CDCs and formulate strategies for improvement, plan implementation of improvements, and execute/oversee plans to completion.
- Conduct real-time analysis using SIEM, Endpoint, and Network based technologies with a focus on identifying security events and false positives.
- Advise on CDC, CSIRT, and SOC Management activities.
- Research and leverage cyber security intelligence sources, attacker techniques, containment methodologies, and remediation processes to improve SOC incident detection and response capabilities.
- Engage and collaborate with client stakeholders and other groups within customer environment to drive resolution for security issues.