Mad Security - Huntsville, AL

posted 3 months ago

Full-time - Senior
Huntsville, AL
Administrative and Support Services

About the position

At MAD Security, your passion for excellence and dedication to integrity can thrive. Every challenge is an opportunity to innovate, and every project is a chance to exceed expectations. As an esteemed team member, you're not just doing a job; you're making a difference in a culture that values hard work, accountability, and continuous growth. Be a part of a team where your efforts are recognized and celebrated, your integrity is cherished, and your professional development is a priority. We seek a Tier 3 Security Operations Center (SOC) Analyst with experience working in a SOC or NOC in the MSP or MSSP environments. The ideal candidate will have a passion for high standards and constant improvement with a focus on safeguarding our clients by simplifying cybersecurity challenges. Candidate must have extensive experience in SOC operations and management, incident response (IR), firewall management (FW), and vulnerability management (VM). As a SOC Tier 3 Analyst, this position is part of a multi-function team, including network engineers, cyber operations technical leads, cyber operations center managers, firewall engineers, and compliance management consultants. The Tier 3 Analyst reports to the Senior Cyber Engineer. The key responsibilities of this position fall into three categories: 1. You will provide cybersecurity advice and support to our clients, understanding how to build rapport and maintain client relationships with a focus on partnership to address their cybersecurity challenges; 2. You will participate in meetings and discussions with senior company executives, Information System Managers, and Cybersecurity Specialists within and outside of MAD Security; and 3. You will participate in accomplishing company monthly, quarterly, and annual objectives.

Responsibilities

  • Provide cybersecurity advice and support to clients, building rapport and maintaining relationships.
  • Participate in meetings and discussions with senior executives and cybersecurity specialists.
  • Accomplish company monthly, quarterly, and annual objectives.
  • Master the technical tools and procedures used to manage the SOC.
  • Deep understanding of how SIEM/SOAR technologies function.
  • Administer and maintain Elasticsearch.
  • Problem solve during incident response events.
  • Plan and execute focused threat hunt operations.
  • Collaborate with SOC experts to monitor and identify cybersecurity matters.
  • Analyze, triage, aggregate, escalate, and report on client security events.
  • Perform correlation and trend analysis of security logs and network traffic.
  • Continuously improve SOC technologies to minimize false positives.
  • Develop and track key performance indicators (KPIs) related to SOC operations.
  • Develop comprehensive reports and presentations for technical and executive audiences.
  • Design and conduct proof-of-concept tests to replicate findings and propose solutions.
  • Communicate regularly with team and clients to proactively address concerns.

Requirements

  • Minimum six (6) years of experience in IT Security and/or Information Technology.
  • Experience working in a Security Operations Center in an enterprise or managed services provider environment.
  • Experience in incident response, forensics, malware reverse engineering, or incident investigation in large scale environments.
  • A bachelor's degree in Information Technology, Information Security/Assurance, Computer Science, or equivalent combination of education and experience is preferred.
  • A master's degree is a plus.
  • Industry-recognized professional certifications such as GCIH, GCFA, GNFA, GREM are required.
  • Experience with industry security tooling such as Fortinet, AT&T AlienVault, Avanan, Preveil, Bricata, Elastic is a plus.
  • Strong problem-solving and critical-thinking skills.
  • Ability to prioritize and execute autonomously.
  • Ability to develop and manage cybersecurity projects.
  • Ability to communicate effectively with all staff, management, and clients orally and in writing.
  • Ability to collaborate across the organization and operate effectively with multiple teams.

Nice-to-haves

  • Experience with emerging technologies and tactics used within a SOC or IR.
  • Understanding of tactics, techniques, and procedures associated with cyber threats.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service