US
0 suggestions are available, use up and down arrow to navigate them
What job do you want?

Security Operation Center (SOC) Engineer job in Wall Township at Jobot

Create Job Alert.

Get similar jobs sent to your email

List of Jobs

Apply to this job.
Think you're the perfect candidate?
Apply Now
Security Operation Center (SOC) Engineer at Jobot

Security Operation Center (SOC) Engineer

Jobot Wall Township, NJ (On Site) Full-Time
$100,000 - $125,000/Year
Apply Now
SOC Analyst position with competitive Pay, and Good Benefits. Must have telecom experience

This Jobot Job is hosted by: Jake McSwain
Are you a fit? Easy Apply now by clicking the "Apply Now" button and sending us your resume.
Salary: $100,000 - $125,000 per year

A bit about us:

Our Client, a leading national next generation aggregator of Voice, Internet, Cloud Communications and Managed Services, is seeking a skilled SOC Analyst to join a growing and talented team.

They are proud of having created a unique and valued experience for some of the most well-known brands throughout the country by providing exceptional service and technology solutions crafted to meet and exceed their business needs. We owe our success to a set of simple principles: integrity, honesty, flexibility, and ambition. It is the embodiment of these traits that make them a distinctive integrated solutions company. As a privately held company we seek individuals who can help contribute to the company’s success. This means you are not shy, you like rolling up your sleeves, digging in, and helping solve problems, you feel energized when you present an idea and most importantly you are persistent, passionate and never satisfied with the status quo.

Why join us?

Our client is a leader in the telecommunications industry. They have Geo-redundant state-of-the-art NOCs, and a beautiful office space if you choose to work on site.

Job Details

SOC Engineer serve as subject matter experts to security threats, alerts, and incidents, as part of our 24/7 SOC team. Our SOC Engineers are responsible for tuning security alerts detected by FortiSIEM, FortiEDR, and DarkTrace NDR, and analyzing all available data to determine if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, performing forensic investigations to determine the details around threats and attacks, and providing guidance on remediation actions.

DUTIES AND RESPONSIBILITIES
  • Analytics and Cyber Threat Analysis
  • Continuous & persistent monitoring of security technologies/tool data and network traffic which result in security alerts generated, parsed, triggered, or observed on the in-scope managed networks, enclaves, systems or security technologies;
  • Correlation and trend analysis of security logs, network traffic, security alerts, events and incidents;
  • Continuously works to tune security tools to minimize false positives and maximize detection and prevention effectiveness. Collaborates with the owners of cyber defense tools to tune systems for optimum performance;
  • Analyzes malware and attacker tactics to improve network detection capabilities. Collaborates with external companies or government agencies to share open source or classified intelligence;
  • Distributes use case context, vulnerability and threat advisories as relevant to optimize security tools, SIEM and client awareness;
  • Incident categorization and severity assignment consistent with client criteria;
  • Event and incident handling consistent with applicable client plans and processes;

REQUIREDSKILLS:
  • Prior experience working in any of the following three: Security Operations Center (SOC), Network Operations Center (NOC), Computer Incident Response Team (CIRT)
  • Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks
  • Experience in computer intrusion analysis and incident response
  • Working knowledge of Intrusion detection/protection systems
  • Knowledge and understanding of network devices, multiple operating systems, and secure architectures
  • Ability code in one or more general purpose languages
  • Strong understanding of various Linux OS’s (Centos, Ubuntu, Debian, etc)
  • Understanding of various virtualization platforms VMware, HyperV, and VirtualBox
  • Working knowledge of network protocols and common services
  • Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)

EXPERIENCE
• 5+ years of related work experience with a Bachelor's degree; or 4 years with Master's degree
  • FortiSIEM, FortiEDR, and Dark Trace NDR
  • Familiar knowledge of Process and IT service management concepts such as ITIL and ITSM
  • Familiarity with digital forensic techniques and recoveries

Education / Certification /Training
Minimum
  • Bachelor's Degree in Management Information Systems, Computer Science is preferred. Desired
  • Master's degree in Computer Security, Cybersecurity, etc.
  • Certifications related to security (such as Security+, GSEC, GCIH, GCIA, CISSP, NCSF, etc.)
  • Certifications in Fortinet


Interested in hearing more? Easy Apply now by clicking the "Apply Now" button.

Recommended Skills

  • Business Informatics
  • Cent Os
  • Certified Information Systems Security Professional
  • Computer Networks
  • Data Analysis
  • Debian Linux
Apply to this job.
Think you're the perfect candidate?
Apply Now

Help us improve CareerBuilder by providing feedback about this job:

Job ID: 504360728

CareerBuilder TIP

For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.

By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.