Security Operations Center (SOC) Analyst, Tier 1 - Provectus Serbia Bookmark Share Print 193 0 2

Listing Description

Provectus is a global technology consulting firm and AWS Premier Partner, that designs and builds solutions for industry-specific use cases, leveraging expertise in data, machine learning, and cloud technologies while fostering a collaborative and inclusive culture.

We are seeking a dedicated and proactive Security Operations Center (SOC) Analyst to join our dynamic SOC team. 

Role Overview: You will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations across client infrastructures. You will perform tasks including monitoring, research, classification, and analysis of security events that occur within our client environments. Level 1 SOC Analysts are the front-line defenses, working closely with Level 2 and Security Engineers, escalating cases as necessary for Incident Response.

Requirements:
  • Minimum of 1 year of experience in the Information Security field.
  • Strong understanding of systems security, security testing, and software security.
  • Understanding of cybersecurity principles and general knowledge of cybersecurity technologies, as well as industry-recognized certifications.
  • Understanding possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
  • General knowledge of the capabilities and/or configuration of cybersecurity controls, specifically those relating to firewalls, access control, authentication, anti-virus/anti-malware, patching, and logging.
  • Understanding of fundamental networking protocols such as TCP/IP, DNS, HTTP, DHCP, SSH, etc.
  • Experience with *nix platforms.
  • Familiar with scripting languages (Bash, Python, Ruby, Perl, Powershell).
  • Have basic knowledge of cloud security principles and technologies (e.g., AWS, GCP, Azure).
  • Strong analytical and investigative skills.
  • Good written and oral communication skills.
  • Team player, able to function independently with minimal supervision and as part of a team.
  • At least an Intermediate level of English.

  • Responsibilities:
  • Continuously monitor security information and event management (SIEM) systems for suspicious activities and potential security threats. Responding to alerts within defined SLAs.
  • Conduct initial triage of security alerts to assess the nature and severity of potential threats, determining if an alert is a false positive or requires further investigation.
  • Accurately document incidents and actions taken in the incident management system, maintaining detailed records for further analysis and reporting.
  • Perform basic analysis of security events, including reviewing logs, network traffic, and endpoint activity, to identify potential security incidents.
  • Communicate and escalate incidents to Tier 2 analysts or the SOC Manager as necessary, providing clear and concise information about the nature of the incident.
  • Assist in updating threat intelligence feeds and maintaining up-to-date knowledge of the current threat landscape, including emerging threats and vulnerabilities.
  • Ensure compliance with organizational policies, procedures, and regulatory requirements related to cybersecurity.

  • Listing Details

    • Citizenship: Not Provided
    • Incentives: Not Provided

     

    • Education: Not Provided
    • Travel: Not Provided
    • Telework: Not Provided



    About Us

    NinjaJobs is a community-run job platform developed by information security professionals. Our unique approach of focusing strictly on cybersecurity positions allows us to personalize the user experience.

    Our Contacts

    1765 Greensboro Station Pl.
    Suite 900
    Tysons Corner Va 22102

    (703) 594-7765