Security Operations Center (SOC) Analyst

Posted 2 weeks ago

Company Background

GRA Quantum is a pioneering information security firm founded upon the belief that every organization has the right to keep its data private and secure. Our mission is to build close partnerships with our clients, serving them not as just a vendor, but as trusted advisors helping to build effective, proactive plans. Our focus is always on both the technical and human elements within an organization. We believe in comprehensive strategies designed to harden networks, deflect attackers, and rapidly recover from any accidents. As technology progresses, so too do our tactics, ensuring our experts are always prepared to serve forward-looking leaders eager to stay ahead of emerging threats. GRA Quantum is a wholly-owned subsidiary of Global Risk Advisors.

Position Overview

GRA Quantum is seeking a focused Security Operations Center (SOC) Analyst to take on an exciting role in Salt Lake City, UT.   The successful candidate will report directly to the Director of Managed Security Services and will be responsible for security threat hunting, event analysis, incident response, and other SOC duties as assigned. Analysts are expected to develop other skills and will receive on-the-job training in areas such as vulnerability management, penetration testing, technical writing, ethical hacking, digital forensics, and other security related skills. The successful candidate will assist other SOC analysts in junior roles with mentorship, training, and onboarding. SIEM administration skills are highly desirable. Growth opportunities to Sr. SOC Analyst and SOC Lead are likely for a candidate who can hit the ground running, is a self-starter, and who can demonstrate excellent analytical and critical thinking skills.

Skills Required and Job Responsibilities

We’re looking for someone with a broad range of experience in hardware and software technologies that can work in a fast-paced environment:

  • Responsible for monitoring, analyzing, and interpreting security/system logs for events, operational
  • irregularities, and potential incidents and escalating issues as appropriate
  • Responsible for analyzing suspicious emails, phone calls, and other potential security incidents to
  • determine false positives or needs for escalation
  • Responsible for implementing, utilizing, tuning, and administering security tools such as anti-virus,
  • endpoint protection, network analysis, SIEM, and other essential security solutions
  • Provides support to remediate vulnerabilities such as patching, implementing controls to mitigate risk, and
  • ensuring secure configuration of systems
  • Performs regular threat hunting using security tools and intelligence information to identify and
  • remediate potential security threats
  • Performs research and remains aware of new and emerging threats to ensure newly discovered
  • vulnerabilities are addressed
  • Acts as an Incident Response team member when the incident response team is active. Incident response
  • tasks may include identification, log and event collection and analysis, forensic investigation support,
  • communication support, and evidence handling
  • Assist in documenting Standard Operating Procedures, SOC playbooks, configuration guides, and secure standards
  • Prior hands-on experience in network, system, and/or endpoint security operations required
  • Solid understanding of information technology and information security including: firewalls/UTM’s,
  • IDS/IPS, VPN’s, penetration testing, security event monitoring, and other security systems with an
  • emphasis on threat hunting and log analysis
  • Excellent written and verbal communication skills
  • Exceptional analytical and problem-solving skills; someone who ‘sees’ the box differently
  • Experience developing and managing remediation plans/corrective actions
  • Understanding of IT infrastructure, information security, and compliance controls
  • CISSP, CISM, CISA, GIAC or other recognized security certification is preferred
  • Comfortable with multiple, current operating environments
  • Familiarity with modern exploit techniques, mitigation strategies, and counter-attack methodologies
  • Hands-on experience with various security tools
  • Ability and willingness to learn other security skills such as pen testing, ethical hacking, digital forensics, or vulnerability management

Minimum Qualifications

  • Associates degree or similar industry experience in cyber security, information technology, computer science, or similar field
  • Two years of industry experience in IT Security. Experience working as a SOC analyst is highly desired

This position has the potential to be shift-based in a 24×7 operation

Apply Online