Job Details

ID #21688155
State New York
City New york city
Job type Contract
Salary USD DOE DOE
Source Trigyn Technologies, Inc.
Showed 2021-10-25
Date 2021-10-24
Deadline 2021-12-22
Category Et cetera
Create resume

SOC Analyst (SIEM / Splunk)

New York, New york city, 10001 New york city USA

Vacancy expired!

Our client a major financial services firm headquartered in NYC has a long-term project for an experienced SOC Analyst. This is a long-term project (12 months), with the potential to convert to a direct-hire position. The position is fully remote / WFH!

Overview:This position is for a core team member to supplement the firms growing cyber security monitoring function. The candidate will join a team currently responsible for: Providing first level response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. The event management includes triage, correlation and enrichment of individual events to either rule out as false positive, trigger standard detective and corrective responses, or escalating as a security incident. Improving the service level for security operations and monitoring. Creating and maintaining system documentation for security event processing. Expands the usage of security monitoring tools to improve the security of the environment based on business use cases or changes in threat landscape, root causes from security incident response, or output from security analytics Configuring and monitoring Security Information and Event Management (SIEM) platform for security alerts. Integrate and work with the firms Managed Security Services Provider (MSSP) services Providing reporting and metrics around security monitoring by designing dashboards for asset owners and management consumption. Leveraging existing technologies within the organization to expand the scope of coverage of the security monitoring service.

Key qualifications to this role: 3-5 years of experience in information security or related technology experience required, experience in the securities or financial services industry is a plus. Minimum three years of security monitoring experience and incident response activities; preferably within a professional services firm or similar environment Experience with SIEM technologies, log management tools, security analytics platforms, and forensic offerings. Prior experience with Splunk also required

Other attributes that would make you an ideal candidate: Understanding of network, desktop and server technologies, including experience with network intrusion methods, network containment, segregation techniques and technologies such as Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS) Experience with malware analysis, virus exploitation and mitigation techniques Strong knowledge of incident response and crisis management Strong verbal and written communication skills Experience with fraud monitoring, data leakage prevention, and privileged access monitoring a plus. Bachelor's degree in computer science or a related discipline, or equivalent work experience required, advanced degree preferred. Industry certifications such as CISSP or GCIH a plus.

For an immediate response, please call 732-876-7632 or send your resume to RecruiterCSE@Trigyn.com Thank you!

TRIGYN TECHNOLOGIES, INC. is an EQUAL OPPORTUNITY EMPLOYER and has been in business for 30 years. TRIGYN is an ISO 9001:2015, ISO 27001:2013 (ISMS) and CMMI Level 5 certified company.

Vacancy expired!

Subscribe Report job