Inceptus
Inceptus
  • Home
  • Cybersecurity Services
    • SIEM & SOC Monitoring
    • EDR
    • EMAIL PROTECTION
    • THREAT HUNTING
    • IDENTITY- IDAM/SSO
    • BREACH & ATTACK
    • DATA PROTECTION
    • Virtual CISO
    • Penetration Testing
    • Security Assessments
    • Policy & Procedures
    • Security Awareness
    • Digital Forensics & IR
    • Social Media Monitoring
  • Industry Solutions
    • Financial Instituitions
    • HNW & Family Office
    • State & Local Government
    • Defense Contractor / CMMC
  • Company
    • About Inceptus
    • Leadership Team
    • Managed Cyber Protections
    • Professional Services
    • The Inceptus Ecosystem
  • Resources
    • Business Risk Assessment
    • Become A Partner
    • Inceptus BLOG
    • Inceptus VLOG
    • Webinars & Lectures
    • Inceptus in the News
    • Resource Center
    • Cyber Security Terms
  • Contact Us
  • More
    • Home
    • Cybersecurity Services
      • SIEM & SOC Monitoring
      • EDR
      • EMAIL PROTECTION
      • THREAT HUNTING
      • IDENTITY- IDAM/SSO
      • BREACH & ATTACK
      • DATA PROTECTION
      • Virtual CISO
      • Penetration Testing
      • Security Assessments
      • Policy & Procedures
      • Security Awareness
      • Digital Forensics & IR
      • Social Media Monitoring
    • Industry Solutions
      • Financial Instituitions
      • HNW & Family Office
      • State & Local Government
      • Defense Contractor / CMMC
    • Company
      • About Inceptus
      • Leadership Team
      • Managed Cyber Protections
      • Professional Services
      • The Inceptus Ecosystem
    • Resources
      • Business Risk Assessment
      • Become A Partner
      • Inceptus BLOG
      • Inceptus VLOG
      • Webinars & Lectures
      • Inceptus in the News
      • Resource Center
      • Cyber Security Terms
    • Contact Us
  • Home
  • Cybersecurity Services
    • SIEM & SOC Monitoring
    • EDR
    • EMAIL PROTECTION
    • THREAT HUNTING
    • IDENTITY- IDAM/SSO
    • BREACH & ATTACK
    • DATA PROTECTION
    • Virtual CISO
    • Penetration Testing
    • Security Assessments
    • Policy & Procedures
    • Security Awareness
    • Digital Forensics & IR
    • Social Media Monitoring
  • Industry Solutions
    • Financial Instituitions
    • HNW & Family Office
    • State & Local Government
    • Defense Contractor / CMMC
  • Company
    • About Inceptus
    • Leadership Team
    • Managed Cyber Protections
    • Professional Services
    • The Inceptus Ecosystem
  • Resources
    • Business Risk Assessment
    • Become A Partner
    • Inceptus BLOG
    • Inceptus VLOG
    • Webinars & Lectures
    • Inceptus in the News
    • Resource Center
    • Cyber Security Terms
  • Contact Us

SOC Analyst

Description

Summary of Position: The Security Operations Center (SOC) Analyst provides dedicated monitoring and analysis of cyber security events. The Junior Analyst will perform analysis of security events to include validation, escalation and reporting of events of interest (EOI) and incidents. They will be responsible for ensuring the SOC triage channels and associated EOI are continuously monitored and reviewed

Principle Duties & Responsibilities

  • Operating popular enterprise SIEM and logging platforms
  • Provided knowledge of network monitoring, analysis, troubleshooting, and configuration control technologies
  • Assist in escalation and reporting procedures and supporting network investigations
  • Assist and provide Knowledge of TCP/IP communications and how common protocols and applications work at the network level, including DNS, HTTP, and SMB
  • Provide knowledge of how the Windows file system and registry function

Education & Experience Requirements

  • 1-2+ years of experience working in a Security Operations Center or similar environment
  • Bachelors of Science or Bachelors of Arts degree preferred
  • Preferred certifications: Security+, CEH, SSCP, CASP, Network+
    Physical Requirements: This is primarily a sedentary office position which requires the incumbent to have the ability to operate computer equipment, speak, hear, bend, stoop, reach, lift, and move and carry up to 25 lbs. Finger dexterity is necessary. 

Physical Requirements

This is primarily a sedentary office position which requires the incumbent to have the ability to operate computer equipment, speak, hear, bend, stoop, reach, lift, and move and carry up to 25 lbs. Finger dexterity is necessary.

Additional Requirements

  • Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly
  • Experience working in a 24/7 SOC environment or similar IT/Security environment
  • Experience with common incident response tools and technologies
  • Knowledge of UNIX operating systems and command line tools
  • Knowledge of cyber threat capabilities and technical capabilities to defend networks and systems
  • Knowledge of network operating systems, SLAs, and service expertise
  • Ability to inform or brief management and senior leadership, when appropriate
  • Possession of excellent oral and written communication skills to clearly and concisely
    document security incident details and escalate appropriately, when required
  • Excellent initiative and critical thinking skills

This description outlines the basic responsibilities and requirements for the position noted. This is not a comprehensive listing of all job duties of the Associates. Duties, responsibilities and activities may change at any time with or without notice

Want to make a difference?

Drop us a line!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Copyright © 2021 Inceptus, LLC. - All Rights Reserved.

  • Home

Powered by

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

Accept & Close