Netsync Network Solutions SOC Analyst I in Dallas, Texas
Netsync is an award winning MSSP that provides numerous security solutions, including a 24x7 Security Operations Center (SOC). Netsync is a leader in innovation, is moving at an amazing pace, and is looking for a SOC Analyst to join a dynamic and growing team of individuals.
As a SOC Analyst Level 1, your primary responsibilities will be focused on the initial triaging and validation of alerts, threat hunting, managing and responding to security incidents across customers, creation of event reports with supporting evidence, develop processes, SOP's and runbooks, threat intelligence enrichment, and providing clients with a direct line of communication for managing security events and incidents. Additionally, you will have the opportunity to work with specialized teams for performing Threat Hunts, Reverse Engineering, Web and Application defenses and environmental counter measures to grow your skill set and better protect our clients
In this role, you will have the opportunity to, not only impact, but shape the future of the SOC and MSSP team.
Roles and Responsibilities
Regularly review logs from environments to detect anomalous behaviors and/or validation of data source feeds from the associated devices.
Perform Computer Security Incident Response activities and coordinate with other teams to record incident details, create reports, and provide remediation recommendations.
Analyze alerts from security platforms for validation or escalation as established by policies and procedures within Service Level Agreements (SLA's).
Assist and be mentored by team leads within the SOC for Threat Hunting, Malware Analysis or Reverse Engineering, Digital Forensics, Incident Response, and Web Defense as required.
Prepare vulnerability assessment reports for clients, outlining critical vulnerabilities and provide recommendations for remediation efforts to mitigate attack surface as efficiently as possible.
Perform routine research on current activities of threat actors and trends via utilization of multiple Threat Intelligence networks to assist in data enrichment within service offerings.
Regularly audit client environments for misconfigurations and providing reports of identified configuration issues with recommendations for remediation.
Aid in creation of rules and policies within the MSSP offerings to tune and enhance the capabilities of the platform.
Assistance in tuning of various EDR solutions for clients to enhance endpoint hardening.
Duties as assigned
Skills and Experience
Passion for Information Security is a MUST! We firmly believe that passion is the gateway to learning and developing your skills!
Ability to take accountability for your actions and responsibilities, owning problems and tasks assigned to you and fulfilling them to completion.
3+ years of working experience in information security, technical operations, or similar capacities.
Ability to utilize CLI's across multiple operating systems for routine tasks such as identifying running processes or services, logged on users, permissions, review logs, etc.
Strong knowledge of at least one coding or scripting language to automate or enhance routinely performed tasks.
Ability to use the TTP's of the MITRE ATT&CK framework curation to strengthen network attack detections and defenses.
Ability to work in a diverse, fast-paced environment and effectively collaborate across teams.
Exceptional people skills with demonstrated ability to work with both a technical and functional audience.
In depth understanding of hardening various OS architectures such as OSX, Linux, and Windows
Experience in identifying configuration errors and providing counter measures within Active Directory environments
Solid understanding of networking and security including routing/networking and TCP-IP protocols such as SMTP, HTTP/S, POP3, IMAP, TLS/SSL, and Proxies.
Understanding of OWASP Top 10 at macro level, ability to communicate how these security risks operate and function to a non-technical audience.
Knowledge of Cyber Security compliance frameworks such as PCI DSS, SOX, HIPAA, ISO 27000-series, GDPR, and NIST.
Ability to acquire cyber security certification from MSSP approved curriculum for Threat Hunting, Network Defense, Malware Analysis / Reverse Engineering, Incident Response, or Digital Forensics within 4 months of hire date if not already certified.
Experience in a SOC, Security Analyst position, or equivalent
Minimum Qualifications/Technical and Educational Requirements
BA/BS in Computer Science/Cyber Security or equivalent work experience.
Firm grasp of multiple coding or scripting languages such as: Python, Java, C#, VBA, Vbscript, Perl, PowerShell, and BASH or other Unix Shells.
Experience with vulnerability management and Identity and Access Management platforms.
A minimum of 3 years in IT with 1 to 2 years in Information Security focused roles. Practical, hands-on industry certifications preferred from ISC2, GIAC, eLearnSecurity, Offensive Security, EC-Council, or CompTIA