MS Sentinel and Azure Cloud Analyst II
Location
United States
Posted
6 days ago
Salary
$76K - $100K / year
Seniority
Mid Level
Job Description
Role Description
This position is for a Level 2 Security Monitoring Analyst that will join our Cyber Security Operations team in US Only. The purpose of the role is to work with various tools and technologies, preferably MS Sentinel and Azure Cloud experience for discovering security incidents. Responsibilities include:
- Performing real-time monitoring on malicious activities, intrusions, and infiltration attempts.
- Analyzing logs looking for attack patterns to ensure infiltration attempts are identified and dealt with in a timely manner.
- Performing security analysis and reviewing alerts, escalating to Level-3 as necessary.
- Providing primary level of analysis and technical insights for security incidents.
Qualifications
- Bachelor’s Degree from a four-year college or university in Information Technology, Information Security/Assurance, Engineering, or a similar area of study required.
- Prefer 1-2 years SOC/Information Security experience.
- Prefer experience working as part of globally distributed teams.
- Prefer 1-2 years Managed Services experience.
- Prefer 1-2 years Azure Cloud security experience.
- Prefer 1-2 years MS Sentinel experience.
- Prefer 1-2 years EDR technologies experience.
- Preferred candidates will have one or more certifications in Security/Networking including Security+, GSEC, GCIA, GCIH, or other security-specific vendor/product certifications.
- Proven ability to make decisions and perform complex problem-solving activities under pressure.
- Sharp analytical abilities and the ability to make sound decisions quickly are required.
Requirements
- Primarily responsible for executing the security event assessment of security events from SIEM reporting systems.
- Identify threats to our environment, remediate security threats, and recover systems from security incidents.
- Work closely with Level 2 & Level 3 teams towards the continuous improvement of the service.
- Ensure that all applications are functional and secure (IT security, Application Security, and Information Security).
- Perform real-time security monitoring and incident response activities across global networks, leveraging a variety of tools and techniques.
- Detect incidents through use cases, threat intelligence, and hunting processes across security-relevant data sets.
- Recommend new, repeatable methods for finding malicious activities.
- Ensure all standards including Security Incident Response Process and guidelines are followed.
- Communicate effectively with individuals at all levels of the organization.
- Provide correlation and trending of critical cyber incident activity.
- Improve the service level for security operations and monitoring.
- Create and maintain system documentation for security event processing.
- Author Standard Operating Procedures (SOPs) and training documentation.
- Analyze incident indicators and tactics, techniques, and procedures (TTPs) to identify tools, provide context and severity.
- Manage and maintain security tools to increase incident response efficiency.
- Improve ability to detect and respond to intrusions.
- Help create and maintain process and tools documentation.
Benefits
- Health & Welfare Benefits: Comprehensive plans tailored to your needs, effective from day one.
- Retirement Savings: Robust programs to help you secure your financial future.
- Employee Discounts: Access to a wide range of discounts on merchandise, services, travel, and more.
- Career Growth Opportunities: Paths for advancement within a global organization.
- Paid Training: Learn while you earn with award-winning learning platforms.
- Paid Time Off: Competitive PTO packages to help you recharge.
- Great Work Environment: Join an award-winning culture that values diversity and inclusion.
Job Requirements
- Bachelor’s Degree from a four-year college or university in Information Technology, Information Security/Assurance, Engineering, or a similar area of study required.
- Prefer 1-2 years SOC/Information Security experience.
- Prefer experience working as part of globally distributed teams.
- Prefer 1-2 years Managed Services experience.
- Prefer 1-2 years Azure Cloud security experience.
- Prefer 1-2 years MS Sentinel experience.
- Prefer 1-2 years EDR technologies experience.
- Preferred candidates will have one or more certifications in Security/Networking including Security+, GSEC, GCIA, GCIH, or other security-specific vendor/product certifications.
- Proven ability to make decisions and perform complex problem-solving activities under pressure.
- Sharp analytical abilities and the ability to make sound decisions quickly are required.
- Primarily responsible for executing the security event assessment of security events from SIEM reporting systems.
- Identify threats to our environment, remediate security threats, and recover systems from security incidents.
- Work closely with Level 2 & Level 3 teams towards the continuous improvement of the service.
- Ensure that all applications are functional and secure (IT security, Application Security, and Information Security).
- Perform real-time security monitoring and incident response activities across global networks, leveraging a variety of tools and techniques.
- Detect incidents through use cases, threat intelligence, and hunting processes across security-relevant data sets.
- Recommend new, repeatable methods for finding malicious activities.
- Ensure all standards including Security Incident Response Process and guidelines are followed.
- Communicate effectively with individuals at all levels of the organization.
- Provide correlation and trending of critical cyber incident activity.
- Improve the service level for security operations and monitoring.
- Create and maintain system documentation for security event processing.
- Author Standard Operating Procedures (SOPs) and training documentation.
- Analyze incident indicators and tactics, techniques, and procedures (TTPs) to identify tools, provide context and severity.
- Manage and maintain security tools to increase incident response efficiency.
- Improve ability to detect and respond to intrusions.
- Help create and maintain process and tools documentation.
Benefits
- Health & Welfare Benefits: Comprehensive plans tailored to your needs, effective from day one.
- Retirement Savings: Robust programs to help you secure your financial future.
- Employee Discounts: Access to a wide range of discounts on merchandise, services, travel, and more.
- Career Growth Opportunities: Paths for advancement within a global organization.
- Paid Training: Learn while you earn with award-winning learning platforms.
- Paid Time Off: Competitive PTO packages to help you recharge.
- Great Work Environment: Join an award-winning culture that values diversity and inclusion.
Related Guides
Related Categories
Related Job Pages
More Security Analyst Jobs
This sworn position enforces the rules and regulations of the Department's 13 health regulatory boards, as well as associated Virginia statutes and federal laws. Principal duties involve independently investigating various complaints against licensed health care practitioners and facilities, and submitting reports detailing investigative results to safeguard public safety.
The Fire Investigator is tasked with studying fire and explosion scenes to determine the cause and origin, conveying findings clearly through written reports, and defending opinions in court if necessary. Responsibilities include timely field visits, conducting unbiased analysis, performing necessary field studies, and maintaining close client interaction.
The Fire Investigator is tasked with studying fire and explosion scenes to determine the cause and origin, which involves timely field visits and conducting necessary studies. Findings must be clearly conveyed, usually through detailed written reports, and the investigator may need to defend their opinions in court.
Safety Monitor II
The EMMES CorporationEmmes Group is transforming the future of clinical research, bringing the promise of new medical discovery closer within reach for patients. Emmes Group was founded as Emmes more than 47 years ago, becoming one of the primary clinical research providers to the US government before expanding into public-private partnerships and commercial biopharma. Emmes has built industry-leading capabilities in cell and gene therapy, vaccines and infectious diseases, ophthalmology, rare diseases, and neuroscience. We believe the work we do will have a direct impact on patients’ lives and act accordingly. We strive to build a collaborative culture at the intersection of being a performance and people-driven company. We’re looking for talented professionals eager to help advance clinical research as we work to embed innovation into the fabric of our company.
The Safety Monitor II will implement Pharmacovigilance activities in collaboration with other members of the Pharmacovigilance and Medical Monitoring (PMM) department, under general supervision. The Safety Monitor II will assist senior level Safety Monitors with interventional an...