SOC Analyst

  • Massachusetts
  • Cyberark
Job Description

_

What you will do: _

Operate the Information security SIEM/SOC to monitor and respond to any security alert and potential security incident.

Take reactive and proactive actions against cyber threats and incidents

Maintain and enhance SOC security systems such as SIEM, SOAR, PT simulations, and additional other market-leading systems to always own complete defense visibility and to continuously align it with new attack vectors and techniques

Handle SIEM alerts, document actions and responses, and track remediation actions.

Design and write code to support SIEM and respective systems rules creation, reports and dashboards, playbook definitions and development, interfaces development etc.

Familiarity with cloud services, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure)

Research, simulate, and run penetration tests using publicly available proprietary tools.

Lead security projects/activities with other security and R&D groups according to need.

#LI-SS1

Qualifications: Qualifications

_

What you need to succeed: _

At least 2 years of experience as a SOC operator – a must

At least 3 years of experience in security analysis in a

high-tech

company

Excellent understanding and proven hands-on experience with a leading Splunk SIEM system (defining and building correlation, aggregation, normalization, and parsing).

Proven experience in cloud threat hunting and working with AWS security tools – an advantage

Experience in SOAR system (Cortex XSOAR- an advantage): design and implement playbooks, write scripts and tools (connectors) – an advantage.

Strong understanding of security principles, policies, and industry best practices

Networking knowledge – understand networking essentials, components, data flows, architecture, ports, and protocols, wireless, etc.

General operating system knowledge – Solid understanding and practical experience in various flavors of Windows, macOS and Linux, OS configuration, file system structures, OS components, mobile operating systems etc.

Scripting/coding experience (Python, PowerShell, etc.) for developing, extending, or modifying exploits, shellcode or exploit tools

Hands-on experience in static and dynamic malware analysis - an advantage

Excellent problem-solving/analytical skills

Excellent communication and interpersonal skills

A team player – working in a global team

Ability to work in a multi-tasking environment

Availability – the job requires high availability

Must be a US Citizen

Additional Information

CyberArk is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

We are unable to offer Visa sponsorship or transfer at this time.

The salary range for this position is $81,000 – $115,000/year, plus commissions or discretionary bonus, which will be based on the employee’s performance. Base pay may also vary considerably depending on job-related knowledge, skills, and experience. The compensation package includes a wide range of medical, dental, vision, financial, and other benefits.