soc
-
EncryptedSite is Encrypted
-
CountryHosted in United States
-
Traffic rank#154,025 Site Rank
-
Site Owner informationWhois info
Website is Safe
Traffic rank
#154,025
#154,025
Site age
Location
United States
United States
Newest job postings for soc
via ZipRecruiter
posted_at: 20 hours agoschedule_type: Full-timesalary: 70K–80K a year
SOC Analyst, $70,000 - $80,000 yearly
1st Shift, Full-Time, Monday - Friday...
Earn 2 weeks of vacation after 90 days of employment
Come and experience the difference with R+L Carriers
R+L Carries has an immediate opening for a SOC Analyst at our Wilmington, OH Service Center. The SOC Analyst will be tasked with monitoring, responding to, and tuning security related incidents. The SOC Analyst will also work as a mentor for junior SOC Analysts.
SOC Analyst, $70,000 - $80,000 yearly
1st Shift, Full-Time, Monday - Friday...
Earn 2 weeks of vacation after 90 days of employment
Come and experience the difference with R+L Carriers
R+L Carries has an immediate opening for a SOC Analyst at our Wilmington, OH Service Center. The SOC Analyst will be tasked with monitoring, responding to, and tuning security related incidents. The SOC Analyst will also work as a mentor for junior SOC Analysts. You will also provide guidance related to investigations, peer review, and process documentation.
Duties and Responsibilities:
• Triage incidents and escalate quickly to the correct users
• Provide support on security issues and respond in accordance with SOP and Security Incident Management Plans
• Monitor and review computer security logs and security systems
• Review reports for unusual and malicious system and user activity
• Provide tuning and correlation recommendations to remove false positives
• Follow-up on outstanding security issues and recommend remediation steps
• Research new security threats and determine how to mitigate and detect the threats
• Perform audits of vendors and manage risk assessments
• Documents standard practices and step-by-step procedures
• Other duties as assigned
Essential Requirements:
• Demonstrated experience with security systems including: Firewalls, IDS/IPS, SIEM, DLP
• Demonstrated experience with security concepts including: Least privilege, Defense in Depth, CIA triad
• An understanding of various attack methods and attack surfaces
• Must be able to effectively communicate with users, engineers, and other analysts
• Solid understanding of network protocols
• Must be willing to constantly learn and improve
• Strong technical and analytical skills
• Experience with Cybersecurity frameworks such as NIST, ISO 27001, etc.
Additional Requirements:
• Education: Associate's Degree or higher preferred (In Information Security, Networking, Computer Science, or related discipline)
• Experience: 3+ Years in a security operations environment
• Certifications: Security industry specific certifications are a plus (CEH, GCIH, GCFA, OSCP etc.)
• Exemplary written and oral communication skills
• Take ownership and drive critical issues to resolution
• Ability to manage multiple projects
• A willingness to be challenged and a strong desire to learn
Click here https://youtu.be/5zQ0hhAbWVo
Click here https://www.youtube.com/watch?v=ra1L0OVO1og
R+L Carriers is a family owned, privately held transportation company founded in 1965. Our business caters to the transportation and distribution industry and is designed to provide customers with superior service through efficient administration and innovative thinking. The Company prides itself in treating our employees and customers with respect and honesty. We believe each employee contributes directly to the Company's growth and success. There are many other transportation companies capable of picking up and delivering freight. However, we believed our customers select us because of the efforts of our employees.
R+L Carriers offers an excellent compensation and comprehensive benefits package that includes Medical/Dental/Vision Insurance, 401(k) Retirement Plan with company matching contributions, Paid Vacation & Holidays, and vacation lodging at our exclusive employee resorts in Daytona Beach, FL, Big Bear Lake, CA, Pigeon Forge, TN, and Ocean Isle Beach, NC.
R+L Carriers Shared Services, LLC ("R+L Carriers") and its subsidiary companies will provide equal employment opportunities to all applicants without regard to an applicant's race, color, religion, sex, sexual orientation, gender, gender identity or expression, genetic information, national origin, age, veteran status, disability, or any other status protected by federal or state law. R+L Carriers will provide reasonable accommodations to allow an applicant to participate in the hiring process (e.g., accommodations for a test or job interview) if so requested. When completing this application, you may exclude information that would disclose or otherwise reference your race, religion, age, sex, genetic, veteran status, disability or any other status protected by federal or state law. This application is considered current for ninety (90) days only. At the end of this period, if you are still interested in employment, it will be necessary for you to reapply by completing a new application Show more details...
1st Shift, Full-Time, Monday - Friday...
Earn 2 weeks of vacation after 90 days of employment
Come and experience the difference with R+L Carriers
R+L Carries has an immediate opening for a SOC Analyst at our Wilmington, OH Service Center. The SOC Analyst will be tasked with monitoring, responding to, and tuning security related incidents. The SOC Analyst will also work as a mentor for junior SOC Analysts. You will also provide guidance related to investigations, peer review, and process documentation.
Duties and Responsibilities:
• Triage incidents and escalate quickly to the correct users
• Provide support on security issues and respond in accordance with SOP and Security Incident Management Plans
• Monitor and review computer security logs and security systems
• Review reports for unusual and malicious system and user activity
• Provide tuning and correlation recommendations to remove false positives
• Follow-up on outstanding security issues and recommend remediation steps
• Research new security threats and determine how to mitigate and detect the threats
• Perform audits of vendors and manage risk assessments
• Documents standard practices and step-by-step procedures
• Other duties as assigned
Essential Requirements:
• Demonstrated experience with security systems including: Firewalls, IDS/IPS, SIEM, DLP
• Demonstrated experience with security concepts including: Least privilege, Defense in Depth, CIA triad
• An understanding of various attack methods and attack surfaces
• Must be able to effectively communicate with users, engineers, and other analysts
• Solid understanding of network protocols
• Must be willing to constantly learn and improve
• Strong technical and analytical skills
• Experience with Cybersecurity frameworks such as NIST, ISO 27001, etc.
Additional Requirements:
• Education: Associate's Degree or higher preferred (In Information Security, Networking, Computer Science, or related discipline)
• Experience: 3+ Years in a security operations environment
• Certifications: Security industry specific certifications are a plus (CEH, GCIH, GCFA, OSCP etc.)
• Exemplary written and oral communication skills
• Take ownership and drive critical issues to resolution
• Ability to manage multiple projects
• A willingness to be challenged and a strong desire to learn
Click here https://youtu.be/5zQ0hhAbWVo
Click here https://www.youtube.com/watch?v=ra1L0OVO1og
R+L Carriers is a family owned, privately held transportation company founded in 1965. Our business caters to the transportation and distribution industry and is designed to provide customers with superior service through efficient administration and innovative thinking. The Company prides itself in treating our employees and customers with respect and honesty. We believe each employee contributes directly to the Company's growth and success. There are many other transportation companies capable of picking up and delivering freight. However, we believed our customers select us because of the efforts of our employees.
R+L Carriers offers an excellent compensation and comprehensive benefits package that includes Medical/Dental/Vision Insurance, 401(k) Retirement Plan with company matching contributions, Paid Vacation & Holidays, and vacation lodging at our exclusive employee resorts in Daytona Beach, FL, Big Bear Lake, CA, Pigeon Forge, TN, and Ocean Isle Beach, NC.
R+L Carriers Shared Services, LLC ("R+L Carriers") and its subsidiary companies will provide equal employment opportunities to all applicants without regard to an applicant's race, color, religion, sex, sexual orientation, gender, gender identity or expression, genetic information, national origin, age, veteran status, disability, or any other status protected by federal or state law. R+L Carriers will provide reasonable accommodations to allow an applicant to participate in the hiring process (e.g., accommodations for a test or job interview) if so requested. When completing this application, you may exclude information that would disclose or otherwise reference your race, religion, age, sex, genetic, veteran status, disability or any other status protected by federal or state law. This application is considered current for ninety (90) days only. At the end of this period, if you are still interested in employment, it will be necessary for you to reapply by completing a new application Show more details...
via TEKsystems Careers
posted_at: 5 days agoschedule_type: Full-timesalary: 170K–200K a year
The SOC Manager is responsible for managing the Tier1 Outsourced MSSP, and dark web Monitoring MSSP relationships. The SOC Manager is responsible for the overall security monitoring of all assets, tuning the alerts, analyzing the security event, and maintaining operational security controls in
support of Information Security Program. This role will be focused on leading and performing advanced... triage and detail analysis of security
events of
The SOC Manager is responsible for managing the Tier1 Outsourced MSSP, and dark web Monitoring MSSP relationships. The SOC Manager is responsible for the overall security monitoring of all assets, tuning the alerts, analyzing the security event, and maintaining operational security controls in
support of Information Security Program. This role will be focused on leading and performing advanced... triage and detail analysis of security
events of technology environments and integrating risk-based threat intelligence into the operational environment. The role also supports the
ability to maintain assurance in our technical security controls so that risks to the confidentiality, integrity, and availability of information
systems and infrastructure are sufficiently mitigated which in turn, supports the bank’s operational goals. Assist with vulnerability management oversight,
end user proxy access support as needed, prepare daily SOC reports and ensure that metrics are reported periodically. This role will have oversight of and
responsibility for two or more SOC Analysts and the outsourced MSSP relationship.
Requirements:
• Bachelor’s degree in computer science or information Systems, Information Technology or related focused technical training or in lieu 4 additional years of engineering and project management experience.
• 10 years of related experience in Information Security, with at least 6 years of experience at the lead level of a SOC (Security Operations Center) engaged in cyber incident management and analysis.
• Very familiar using SEIM and EDR tools. Ability to direct the MSSP to tune appropriately.
• Experience dealing with security multiple threat intelligence sources (paid or unpaid) and incorporating the same within our environment.
• Ability to lead the investigation and manage a cybersecurity event and work with the InfoSec and IT team to inspect, examine and resolve.
• Familiarity with other security tools like Vulnerability Management, Antivirus, Web proxies, forensics, etc.
• Previous supervisory or Leadership experience in a SOC environment.
• Two or more of any of the following certifications:
• SANS GIAC Certifications:
• GIAC Certified Perimeter Protection Analyst
• GCIH: GIAC Certified Incident Handler
• GOEC: GIAC Operations Essentials Certifications
• CompTIA Security+
• Certified Ethical Hacker (CEH)
• Knowledge of managing and leading cyber incidents using the Cyber Incident Response Plan (CIRP)
• Participate in Cyber exercise and be the subject matter expert for SOC operations and security events.
• Knowledge of SEIMs like Microsoft Sentinel, LogRhythm, Splunk, etc.; NDR like Darktrace, ExtraHop, Vectra, etc.
• Knowledge of SOC tools like VirusTotal, Abuse IPDb, Cisco Talos, PaloAto Watchfire, Threat Miner, Urlscan, etc.
• Knowledge working on alerts from systems, firewalls (PaloAlto, Fortinet); IDS/IPS, VPN, WAFs, etc.
• Knowledge of TCP/IP networking: networking topology, protocols, and services.
• Broad knowledge of computer networking technology.
• Azure
Preferred:
• 14 years of Security Operations or Security Administration.
• Familiarity with security tools (Pen Testing, Network Detection & Response).
• Ability to do malware analysis and establish a sandbox.
• One or more of the following certifications (or equivalent):
• SANS GIAC Certifications such as:
• GPEN: GIAC Penetration Tester
• Cisco Certified Network Associate Security (CCNA Security)
• Certified Network Defender (CND) or Certified SOC Analyst (CSA)Knowledge and experience of Unified Threat Management, Virtualization, Windows Desktop and Server operating systems, firewall technologies, application layer security controls, and IDS/IPS technologies.
• Knowledge of multiple NBA or UEBA tools.
• Knowledge of SOC Sandboxes and Malware Analysis tools, etc.
• Conduct threat hunting exercises and campaigns. Knowledge of DFIR best practices.
OTHER JOB REQUIREMENTS:
• Ability to work extended hours, when necessary, to support operational requirements.
• Availability for participation in on-call rotation.
About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law Show more details...
support of Information Security Program. This role will be focused on leading and performing advanced... triage and detail analysis of security
events of technology environments and integrating risk-based threat intelligence into the operational environment. The role also supports the
ability to maintain assurance in our technical security controls so that risks to the confidentiality, integrity, and availability of information
systems and infrastructure are sufficiently mitigated which in turn, supports the bank’s operational goals. Assist with vulnerability management oversight,
end user proxy access support as needed, prepare daily SOC reports and ensure that metrics are reported periodically. This role will have oversight of and
responsibility for two or more SOC Analysts and the outsourced MSSP relationship.
Requirements:
• Bachelor’s degree in computer science or information Systems, Information Technology or related focused technical training or in lieu 4 additional years of engineering and project management experience.
• 10 years of related experience in Information Security, with at least 6 years of experience at the lead level of a SOC (Security Operations Center) engaged in cyber incident management and analysis.
• Very familiar using SEIM and EDR tools. Ability to direct the MSSP to tune appropriately.
• Experience dealing with security multiple threat intelligence sources (paid or unpaid) and incorporating the same within our environment.
• Ability to lead the investigation and manage a cybersecurity event and work with the InfoSec and IT team to inspect, examine and resolve.
• Familiarity with other security tools like Vulnerability Management, Antivirus, Web proxies, forensics, etc.
• Previous supervisory or Leadership experience in a SOC environment.
• Two or more of any of the following certifications:
• SANS GIAC Certifications:
• GIAC Certified Perimeter Protection Analyst
• GCIH: GIAC Certified Incident Handler
• GOEC: GIAC Operations Essentials Certifications
• CompTIA Security+
• Certified Ethical Hacker (CEH)
• Knowledge of managing and leading cyber incidents using the Cyber Incident Response Plan (CIRP)
• Participate in Cyber exercise and be the subject matter expert for SOC operations and security events.
• Knowledge of SEIMs like Microsoft Sentinel, LogRhythm, Splunk, etc.; NDR like Darktrace, ExtraHop, Vectra, etc.
• Knowledge of SOC tools like VirusTotal, Abuse IPDb, Cisco Talos, PaloAto Watchfire, Threat Miner, Urlscan, etc.
• Knowledge working on alerts from systems, firewalls (PaloAlto, Fortinet); IDS/IPS, VPN, WAFs, etc.
• Knowledge of TCP/IP networking: networking topology, protocols, and services.
• Broad knowledge of computer networking technology.
• Azure
Preferred:
• 14 years of Security Operations or Security Administration.
• Familiarity with security tools (Pen Testing, Network Detection & Response).
• Ability to do malware analysis and establish a sandbox.
• One or more of the following certifications (or equivalent):
• SANS GIAC Certifications such as:
• GPEN: GIAC Penetration Tester
• Cisco Certified Network Associate Security (CCNA Security)
• Certified Network Defender (CND) or Certified SOC Analyst (CSA)Knowledge and experience of Unified Threat Management, Virtualization, Windows Desktop and Server operating systems, firewall technologies, application layer security controls, and IDS/IPS technologies.
• Knowledge of multiple NBA or UEBA tools.
• Knowledge of SOC Sandboxes and Malware Analysis tools, etc.
• Conduct threat hunting exercises and campaigns. Knowledge of DFIR best practices.
OTHER JOB REQUIREMENTS:
• Ability to work extended hours, when necessary, to support operational requirements.
• Availability for participation in on-call rotation.
About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law Show more details...
via State Street Careers
schedule_type: Full-time
Who are we looking for:
State Street seeks to recruit an Early Career Cyber Security Operations Center (SOC) analyst that will assist in the detection, triage, analysis and response to cyber-attacks. The analyst will join our SOC team which will run a 24/7 coverage, 365 days a year model, with a partner team in Ireland.
The SOC team is responsible for analyzing events from multiple sources from... across a large enterprise network. The SOC will partner
Who are we looking for:
State Street seeks to recruit an Early Career Cyber Security Operations Center (SOC) analyst that will assist in the detection, triage, analysis and response to cyber-attacks. The analyst will join our SOC team which will run a 24/7 coverage, 365 days a year model, with a partner team in Ireland.
The SOC team is responsible for analyzing events from multiple sources from... across a large enterprise network. The SOC will partner with multiple teams in our Cyber Fusion Center including but not limited to Advanced Threat, Cyber Threat Intelligence, & Red/Purple teams.
Join us in evolving our response capabilities to protect State Street, its customers and partners from ever-evolving and sophisticated threat actors. State Street’s Fusion Center is responsible for detecting and responding to various cyber threats 24/7 365 days a year, that are directed towards the enterprise.
This role will be Monday - Friday and will be on-site in State Streets office in Quincy.
What will you be responsible for:
• Detection of cyber security events & incidents in real time through centralized monitoring.
• Analyze cyber security events from multiple sources (SIEM, IP/DS, EDR, AV, Firewalls etc).
• Respond and contain cyber security incidents and identify eradication strategies.
• Identify process improvement areas and new opportunities in technologies or capabilities
• Communicate incident status to Lead analysts and Managers
• Creating an environment which drives knowledge sharing with teams across the Fusion Center
• Help developing the Fusion Center mindset and follow the sun model
• Receive mentorship from other Cyber Security analysts across the Fusion Center
What we value:
• Understanding of networking (TCP/IP networks and protocols)
• Familiar with operating systems (Windows, Linux and MacOS)
• Good all round knowledge of IT architecture including basic scripting ability
• A passion for Cyber Security
• High level understanding of phishing and malware techniques
• Willingness to learn
• Strong time management and communication skills
• Proven ability to work in a team environment
Education & Preferred Qualifications
• Recent Graduates from Bachelors or Masters in Cyber Security, Information Technology, Computer Science, and/or completion of a Cybersecurity boot camp. In lieu of education requirements, relevant industry experience will be considered
Veterans welcome add at the end .
About State Street
What we do. State Street is one of the largest custodian banks, asset managers and asset intelligence companies in the world. From technology to product innovation, we’re making our mark on the financial services industry. For more than two centuries, we’ve been helping our clients safeguard and steward the investments of millions of people. We provide investment servicing, data & analytics, investment research & trading and investment management to institutional clients.
Work, Live and Grow. We make all efforts to create a great work environment. Our benefits packages are competitive and comprehensive. Details vary by location, but you may expect generous medical care, insurance and savings plans, among other perks. You’ll have access to flexible Work Programs to help you match your needs. And our wealth of development programs and educational support will help you reach your full potential.
Inclusion, Diversity and Social Responsibility. We truly believe our employees’ diverse backgrounds, experiences and perspectives are a powerful contributor to creating an inclusive environment where everyone can thrive and reach their maximum potential while adding value to both our organization and our clients. We warmly welcome candidates of diverse origin, background, ability, age, sexual orientation, gender identity and personality. Another fundamental value at State Street is active engagement with our communities around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs and access to employee networks that help you stay connected to what matters to you.
State Street is an equal opportunity and affirmative action employer.
Salary Range:
$70,000 - $115,000 Annual
The range quoted above applies to the role in the primary location specified. If the candidate would ultimately work outside of the primary location above, the applicable range could differ Show more details...
State Street seeks to recruit an Early Career Cyber Security Operations Center (SOC) analyst that will assist in the detection, triage, analysis and response to cyber-attacks. The analyst will join our SOC team which will run a 24/7 coverage, 365 days a year model, with a partner team in Ireland.
The SOC team is responsible for analyzing events from multiple sources from... across a large enterprise network. The SOC will partner with multiple teams in our Cyber Fusion Center including but not limited to Advanced Threat, Cyber Threat Intelligence, & Red/Purple teams.
Join us in evolving our response capabilities to protect State Street, its customers and partners from ever-evolving and sophisticated threat actors. State Street’s Fusion Center is responsible for detecting and responding to various cyber threats 24/7 365 days a year, that are directed towards the enterprise.
This role will be Monday - Friday and will be on-site in State Streets office in Quincy.
What will you be responsible for:
• Detection of cyber security events & incidents in real time through centralized monitoring.
• Analyze cyber security events from multiple sources (SIEM, IP/DS, EDR, AV, Firewalls etc).
• Respond and contain cyber security incidents and identify eradication strategies.
• Identify process improvement areas and new opportunities in technologies or capabilities
• Communicate incident status to Lead analysts and Managers
• Creating an environment which drives knowledge sharing with teams across the Fusion Center
• Help developing the Fusion Center mindset and follow the sun model
• Receive mentorship from other Cyber Security analysts across the Fusion Center
What we value:
• Understanding of networking (TCP/IP networks and protocols)
• Familiar with operating systems (Windows, Linux and MacOS)
• Good all round knowledge of IT architecture including basic scripting ability
• A passion for Cyber Security
• High level understanding of phishing and malware techniques
• Willingness to learn
• Strong time management and communication skills
• Proven ability to work in a team environment
Education & Preferred Qualifications
• Recent Graduates from Bachelors or Masters in Cyber Security, Information Technology, Computer Science, and/or completion of a Cybersecurity boot camp. In lieu of education requirements, relevant industry experience will be considered
Veterans welcome add at the end .
About State Street
What we do. State Street is one of the largest custodian banks, asset managers and asset intelligence companies in the world. From technology to product innovation, we’re making our mark on the financial services industry. For more than two centuries, we’ve been helping our clients safeguard and steward the investments of millions of people. We provide investment servicing, data & analytics, investment research & trading and investment management to institutional clients.
Work, Live and Grow. We make all efforts to create a great work environment. Our benefits packages are competitive and comprehensive. Details vary by location, but you may expect generous medical care, insurance and savings plans, among other perks. You’ll have access to flexible Work Programs to help you match your needs. And our wealth of development programs and educational support will help you reach your full potential.
Inclusion, Diversity and Social Responsibility. We truly believe our employees’ diverse backgrounds, experiences and perspectives are a powerful contributor to creating an inclusive environment where everyone can thrive and reach their maximum potential while adding value to both our organization and our clients. We warmly welcome candidates of diverse origin, background, ability, age, sexual orientation, gender identity and personality. Another fundamental value at State Street is active engagement with our communities around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs and access to employee networks that help you stay connected to what matters to you.
State Street is an equal opportunity and affirmative action employer.
Salary Range:
$70,000 - $115,000 Annual
The range quoted above applies to the role in the primary location specified. If the candidate would ultimately work outside of the primary location above, the applicable range could differ Show more details...
Search trends for soc