SOC Tier 1 Security Analyst

Job Description
Serves as a SOC Tier 1 Analyst supporting monitoring of one or more of the following areas:
• Email and Web Security
• Monitoring and detection (QRadar event console monitoring)
• Incident and problem tracking.
• Will utilize experience to work with various security monitoring technologies and processes.
• This position requires to work on shifts. The Tier 1 SOC Analysts supports a 24/7/365 Security Operations Center and monitors security tools as well as provides first tier response to security incidents.
• The analysts follow standard operating procedures for detecting, classifying, and reporting incidents under the supervision of Tier 2 and Tier 3 staff.
• Practical experience in the following platforms: QRadar IBM, IPS CISCO, Firewalls CISCO, Deep Security Trend Micro, Deep Discovery Inspector (DDI) and Deep Discovery Advisor (DDA) Trend Micro, TripWire, Guardium IBM and Pravail (Arbor)

Required Technical and Professional Expertise

• Duties and tasks are standard with some variation.
• Completes own role largely independently within defined policies and procedures.
• Key skills and abilities include coaching, influencing, facilitation, presentation, communication, process development, analysis, and problem solving.
• Strong verbal and written skills
• 1-2 years Security Operations Center (SOC) environment experience with security engineering and monitoring experience.
• Dedicated monitoring and analysis of cyber security events with provided tools
• Reported events handling and escalation
• Incident Report generation and reporting
• Processes incident communications to include initial reporting, follow-ups, requests for information and resolution activity

Preferred Tech and Prof Experience

• Duties and tasks are standard with some variation.
• Completes own role largely independently within defined policies and procedures.
• Key skills and abilities include coaching, influencing, facilitation, presentation, communication, process development, analysis, and problem solving.
• Strong verbal and written skills
• 1-2 years Security Operations Center (SOC) environment experience with security engineering and monitoring experience.
• Dedicated monitoring and analysis of cyber security events with provided tools
• Reported events handling and escalation
• Incident Report generation and reporting
• Processes incident communications to include initial reporting, follow-ups, requests for information and resolution activity

EO Statement
IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.


Back to top