Location: Either Auburn Hills, MI or Plano, TX or Chandler, AZ (Hybrid role)
Security Operations Center (SOC) Analysis
- Provides advanced technical investigation and forensics capabilities across malware, phishing, cloud access security brokers (CASB), network, and configuration compliance domains.
- Responds to and mitigates security incidents based on defined process and procedures to contain and eradicate threats.
- Resolves or escalates investigations to CSIRT as required, in coordination with the SOC Manager.
- Interfaces with the threat hunting and threat intelligence teams to build proactive searches / signatures in the SIEM or security application to enhance detection capabilities.
- Performs sampled reviews of investigated incidents by Tier 1/Tier 2 Analysts to improve ticket quality and provides feedback to coach junior Analysts.
Documentation and Support
- Participates in the development / enhancement of process and technologies impacting the SOC and the broader Cyber Defense Operations function.
- Collaborates closely with the SOC Manager to develop recommendations and/or technical implementations to improve workflows within the SOC, including the use of automation and optimization of processes.
- Collaborates with other Engineering and Operations teams within Bank to troubleshoot, respond, and improve detection capabilities.
- Handles sensitive information in accordance with the Corporate Information Protection Policy.
Qualifications
- Bachelors' Degree in Computer Science, Engineering, Information Systems, or Cyber Security or equivalent degree or High School Diploma or GED and 10 years of progressive relevant experience
- 5 years of information security/technology experience preferably in a SOC or NOC
- 4 years of experience using various operating systems and industry standard monitoring, logging, alerting and investigation processes
- 2 years of incident response experience