CYBER SECURITY ANALYST
NORTH CAROLINA
HYBRID WORKING (MINIMUM OF 2 DAYS PER WEEK ON-SITE IN RALEIGH)
$80K BASIC SALARY
**Sponsorship is not available with this role**
Our client is a leading cybersecurity organisation that works with clients across multiple industries, including Healthcare, Financial Services, Education, Retail and many more. Based in South Florida, they are looking to expand their team of Cyber Security Analysts as a result of continued growth and client project wins.
RESPONSIBILITIES
- Monitoring and Analysis: Continuously track and assess event logs from Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), firewalls, and SIEM tools to detect potential security threats and cyberattacks, ensuring timely mitigation and suppression.
- Incident Response: Support Computer Security Incident Response (CSIR) efforts as a frontline security analyst, identifying and analyzing various malicious activities within enterprise environments.
- Threat Communication: Promptly relay security alerts and intrusion reports to IT, network, or security teams regarding potential breaches affecting infrastructure, applications, and operating systems.
- Operational Recommendations: While not directly responsible for policy development, provide insights and recommendations to enhance security operations, efficiency, and effectiveness.
- Client Support & Escalation: Address SOC-related inquiries through support tickets, assist clients with security concerns, and act as the initial escalation point for technical or customer-related issues.
- Process Supervision & Team Support: Oversee SOC monitoring and operational processes in the absence of the SOC Manager or Team Lead, ensuring smooth execution of security protocols.
- Threat Detection & Rule Submission: Develop and submit detection rules, correlations, and other mechanisms to identify and respond to malicious activity effectively.
- Subject Matter Expertise: Serve as an SME for SOC services, providing expertise on managed security tools and best practices to strengthen cyber defense strategies.
SKILLS & EXPERIENCE
- Customer Service & Communication: Strong customer service orientation with excellent communication, coaching, and interpersonal skills.
- Analytical & Research Abilities: Strong problem-solving skills with the ability to research and analyze security threats effectively.
- Networking & Security Knowledge: Understanding of fundamental networking principles, including TCP/IP, IP addressing, and common network services (web, mail, FTP, etc.), as well as network vulnerabilities and attack patterns.
- Technical Expertise: Experience with a wide range of security technologies, including but not limited to:
- Firewalls (Cisco, Fortinet, etc.)
- Intrusion Prevention & Detection Systems (IPS/IDS)
- Active Directory, Windows Server, Linux
- SIEM tools (Microsoft Sentinel, Splunk, etc.)
- Vulnerability management tools
- Cloud technologies (AWS, CDN services)
- Endpoint security solutions (SentinelOne, DRM)
- Incident Response & Security Administration: Experience in security incident containment, mitigation, and recovery.
EDUCATION/CERTIFICATIONS
- Degree in Information Security, Cybersecurity, or a related field (or equivalent SOC experience).
- Security+ or other relevant security/networking certifications preferred.
IT SECURITY & SYSTEM ADMINISTRATION
- Familiarity with firewalls and IDS/IPS solutions (Cisco, Snort, Fortinet, etc.).
- Knowledge of IT security principles across physical, hardware, and software domains.
- Experience with SIEM or Service Desk tools.
WORK EXPERIENCE & AVAILABILITY
- Minimum 1-2 years of direct SOC experience.
- Experience working within SLA-driven Security Operations Centers.
- Prior experience in 24x7x365 shift-based security operations is advantageous.
- Willingness to work flexible schedules, including shifts if required.