Match score not available

SOC 3 Analyst

unlimited holidays - fully flexible
Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Minimum 5 years of experience in cybersecurity., 2 years of SOC experience with security engineering and monitoring experience., Knowledge of various operating systems including Windows, Linux, and MacOS., One or more certifications in the cybersecurity domain such as CISSP or CEH..

Key responsabilities:

  • Monitor and triage cybersecurity events with SOC team members.
  • Provide mentoring to SOC Tier 1 and 2 Analysts.
  • Document security incident use cases and develop procedures for SOC operations.
  • Perform threat hunting and build threat detection capabilities.

Clearwater logo
Clearwater Cybersecurity SME https://clearwatersecurity.com/
201 - 500 Employees
See all jobs

Job description

Description

  

ABOUT CLEARWATER

Clearwater serves a diverse and growing base of customers across the healthcare ecosystem, including several of the nation’s largest health systems as well as a large universe of regional hospitals, physician practice management groups, digital health and other healthcare technology companies, medical device manufacturers, and business service providers. Our mission is to help those organizations move to a more secure, compliant, and resilient state so they can achieve their mission.

 Clearwater was named the top Compliance and Risk Management solution provider in Black Book Market Research’s annual survey of the healthcare industry the past eight years in a row, as well as the top-rated Cybersecurity Advisors & Consultants for the past five years in a row.

POSITION SUMMARY

The Tier 3 SOC Analyst is responsible for being the most senior technical resource and mentor to the entire SOC operation. This role, while still required to handle security tickets and the handling of events that come into the SOC, is an escalation and confirmation point in the process of event triage, incident management, and response. The Tier 3 SOC Analyst must be able to perform the many different tasks within the SOC, and mentor the lower-level SOC resources to further expand the SOC’s capabilities and capacity to grow. This position also requires the continued refinement of operational processes and procedures that impact how the SOC operates day to day and to push those refinements to all areas of the SOC through training and real-world application.

This position may require shift work outside of normal business hours (8 am – 5 pm), including nights and weekends.

Requirements

  

SPECIFIC JOB RESPONSIBILITIES

· Works with other SOC team members to monitor and triage cybersecurity events.

· Analyze security threats for managed services customer networks and endpoints.

· Provide advice and guidance on incident handling and proper escalation internally and with clients.

· Provide teaching / mentoring to SOC Tier 1 and 2 Analysts

· Document security incident use cases, develop and update procedures as part of SOC run book.

· Provide remote support to customers for incident management and response.

· Perform threat hunting based on emerging IOCs or Vulnerabilities

· Responsible for building out threat detection capabilities through Microsoft Sentinel is preferred.

· Work with customers on the technologies, methods, and techniques to

EXPERIENCE REQUIRED

· Minimum 5 years of experience in cybersecurity

·  2 years SOC experience with security engineering and monitoring experience is required.

· 3 years of working knowledge of networking and security-related technologies

QUALIFICATIONS, SKILLS, & KNOWLEDGE

· Knowledge of various operating systems including but not limited to Windows, Linux, MacOS

· Knowledge of applications, databases, and middleware design and functioning

· Knowledge of security incident and event management, log analysis, network traffic analysis, malware investigation/remediation, SIEM correlation logic and alert generation

· Demonstrated ability to analyze, triage and remediate security incidents.

· In-depth knowledge of security concepts such as cyber-attacks and techniques, threat management, threat vectors, and risk management

· Excellent verbal and written communication skills required.

· Experience in troubleshooting in a technical environment

·  Excellent analytical and problem-solving skills

· Superior customer service skills

· Active security clearance is a plus but not required.

· One or more certifications in the cybersecurity domain including:

· Certified Information Systems Security Professional (CISSP)

· Certified Ethical Hacker (CEH)

· Certified Intrusion Analyst (GIAC)

· Certified Incident Handler (GCIH)

WORK ENVIRONMENT 

· Currently Clearwater is “virtual” company and all colleagues work remotely.

· Work remotely and provide own printer/scanner, computer audio capability, cell phone, and Internet service. Clearwater will provide a computer and Microsoft Office software.

· Company provides subscriptions to tools selected as standard by the Company

· {IF APPLICABLE} Travel is required an estimated [40 – 60%] of the time.

COMPENSATION & BENEFITS

· Base Salary

Flexible Time Off (FTO) policy for vacation and personal time

· Paid Sick Time

· Medical/Rx, Dental, Vision, Life and Disability Insurance, 401k with Employer Match



 

Clearwater is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race; creed; color; religion; national origin; sex; age; disability; sexual orientation; gender identity or expression; genetic predisposition or carrier status; veteran, marital, or citizenship status; or any other status protected by law.

If you require a reasonable accommodation to complete an application, interview or otherwise participate in the recruiting process, please direct your inquiries to a recruiter @ 615-669-8896 or jobs@clearwatersecurity.com.

This employer participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S.

If E-Verify cannot confirm that you are authorized to work, this employer is required to give you written instructions and an opportunity to contact Department of Homeland Security (DHS) or Social Security Administration (SSA) so you can begin to resolve the issue before the employer can take any action against you, including terminating your employment.

Employers can only use E-Verify once you have accepted a job offer and completed the form I-9.

For more information on E-Verify, or if you believe that your employer has violated its E-Verify responsibilities, please contact DHS. 888-897-7781


Required profile

Experience

Industry :
Cybersecurity
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Mentorship
  • Customer Service
  • Communication
  • Problem Solving

Related jobs