SOC Analyst 2
Job Summary
Perform daily duties within Security Operations.
Perform investigations based on security events reported by various platforms and tools.
Support MSSP operations by reviewing investigation activities and supplementing supporting evidence and
establishing verdicts.
Review field and resolve phishing alerts reported by users including taking remediation action required
against threats.
Identify and review tuning opportunities within various tools and platforms and work within platforms to
implement tuning.
Collaborate with global teams to ensure a cohesive and effective approach to security operations.
Support Security Operations team by identifying process improvement opportunities and making
recommendations.
Create update and maintain documentation such as Playbooks Procedures etc.
Experience building and performing queries against various technologies such as SIEM XDR EDR SOAR etc.
Expert ability to dissect review and carve into log files for different technologies and platforms to
understand and explain anomalous activity.
Experience independently working through investigations including identification of IOCs pivoting based off
new or discovered data and thinking through complex threat scenarios.
Ability to lead complex investigations and perform thorough RCAs based on technical expertise and
prowess.
Strong conceptual and applicable knowledge of Incident Response steps and procedures in various
environments.
About You
5-7 years experience with SOC and Incident Response operations.
Bachelors degree in information systems Cybersecurity a related field or equivalent work experience.
CISSP GCIH CHFI or other related certifications are a bonus.
Deep technical understanding and experience working with Security Information Event Management (SIEM)
Continuous Monitoring platform Intrusion Detection/Prevention System (IDS/IPS) Network Traffic Analysis
Incident Response and/or Endpoint Security Systems.
Advanced knowledge of information security technologies networking systems authentication (including
MFA) and directory services.
Thorough understanding of the Incident Response process phishing and malware investigations.
Ability to adapt think outside the box and pivot when performing investigations or troubleshooting complex
issues.
Ability to operate with a level head when managing competing priorities or operating under pressure.
Strong ability to follow and document playbooks and procedures.
Strong technical writing ability to clearly detail in-depth and complex operational documentation.
Exceptional communication skills including the ability to gather relevant data and information actively listen
dialogue freely verbalize ideas effectively negotiate tense situations successfully and manage and resolve
conflict.
Excellent collaboration skills must be eager to work as part of a cohesive team and work as a partner to
other teams within Aristocrat Inc. locally and globally.
Experience working with a geographically dispersed team.
Perform investigations based on security events reported by various platforms and tools.
Support MSSP operations by reviewing investigation activities and supplementing supporting evidence and
establishing verdicts.
Review field and resolve phishing alerts reported by users including taking remediation action required
against threats.
Identify and review tuning opportunities within various tools and platforms and work within platforms to
implement tuning.
Collaborate with global teams to ensure a cohesive and effective approach to security operations.
Support Security Operations team by identifying process improvement opportunities and making
recommendations.
Create update and maintain documentation such as Playbooks Procedures etc.
Experience building and performing queries against various technologies such as SIEM XDR EDR SOAR etc.
Expert ability to dissect review and carve into log files for different technologies and platforms to
understand and explain anomalous activity.
Experience independently working through investigations including identification of IOCs pivoting based off
new or discovered data and thinking through complex threat scenarios.
Ability to lead complex investigations and perform thorough RCAs based on technical expertise and
prowess.
Strong conceptual and applicable knowledge of Incident Response steps and procedures in various
environments.
About You
5-7 years experience with SOC and Incident Response operations.
Bachelors degree in information systems Cybersecurity a related field or equivalent work experience.
CISSP GCIH CHFI or other related certifications are a bonus.
Deep technical understanding and experience working with Security Information Event Management (SIEM)
Continuous Monitoring platform Intrusion Detection/Prevention System (IDS/IPS) Network Traffic Analysis
Incident Response and/or Endpoint Security Systems.
Advanced knowledge of information security technologies networking systems authentication (including
MFA) and directory services.
Thorough understanding of the Incident Response process phishing and malware investigations.
Ability to adapt think outside the box and pivot when performing investigations or troubleshooting complex
issues.
Ability to operate with a level head when managing competing priorities or operating under pressure.
Strong ability to follow and document playbooks and procedures.
Strong technical writing ability to clearly detail in-depth and complex operational documentation.
Exceptional communication skills including the ability to gather relevant data and information actively listen
dialogue freely verbalize ideas effectively negotiate tense situations successfully and manage and resolve
conflict.
Excellent collaboration skills must be eager to work as part of a cohesive team and work as a partner to
other teams within Aristocrat Inc. locally and globally.
Experience working with a geographically dispersed team.