We are seeking skilled Contract Security Analysts to join the Managed Network Detections and Response (MNDR) team. The successful candidate will play a critical role in our 24/7 security operations, leveraging a suite of security tools to protect our environment. The role involves efficient case management, incident response, and threat hunting.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Dice is the leading career destination for tech experts at every stage of their careers. Our client, VentureSoft Global, is seeking the following. Apply via Dice today!
100% Remote. This requirement is for a Level 1 and Level 2 SOC role.
Client :: Network product based.
Duration :: Longterm
Years of experience :: 10yrs +
The suitable candidate for this position Must have experience with the following tools and technologies:
- CrowdStrike (EDR, NDR, NGSIEM)
- WAF: Fastly and Cloudflare
- Cloud platforms: Google Google Cloud Platform, AWS, and Azure
- IAM: Google IAM, OneLogin, and Active Directory
- Incident Response and Threat Hunting
Interested in remote work opportunities in Development & Programming? Discover Development & Programming Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
- Freshdesk for ticketing
- Jira for project tracking
Key Responsibilities (Applicable To All)
Efficiently manage and document security cases within the Hive and Fresh Service ticketing system.
Contribute to the continuous improvement of security operations processes and technical skills.
Maintain open communication and collaboration with other security team members.
Role-Specific Responsibilities & Requirements
Tier 1 (T1) Security Analyst
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
Alert Triaging & Case Management: Responsible for the efficient handling of Hive Cases, performing initial investigations, and accurately documenting findings.
Operational Adaptability: Must be adaptable and capable of assisting with other security operations tasks beyond core case management.
Escalation & Review: The T1 Analyst must escalate issues to a senior analyst when facing difficulties in determining case outcomes, handling complex customer requests, or requiring expert guidance. Crucially, all cases classified as High or Critical must undergo review by a T2 or T3 analyst before final submission and customer escalation. Furthermore, all tuning adjustments made by a T1 Analyst must be reviewed and approved by a T2 or T3 analyst before case closure.
Tier 2 (T2) Security Analyst
The Tier 2 Analyst serves as a critical bridge, providing expert assistance and proactive threat hunting capabilities.
In-Depth Investigation & Threat Hunting: Conduct in-depth investigations and proactive threat hunting within the NDR platform, CrowdStrike, and CrowdStrike SIEM to identify threats within the Our environment.
Tier 1 Support & Oversight: Support T1 analysts with complex cases, provide mentorship, and are responsible for reviewing and approving all High and Critical cases and all tuning adjustments reported by T1 analysts.
Case Load & Prioritization: Closely monitor case queues, prioritizing Our-related cases for timely resolution. They must maintain situational awareness of the overall case load and be prepared to surge resources as needed.
Customer Onboarding: Expected to possess a deep understanding of the NDR platform and team processes to effectively facilitate customer onboardings.
Qualifications (General)
Relevant certification (e.g., CompTIA Security+, CEH, GIAC certifications) is a plus.
Demonstrated experience in a Security Operations Center (SOC) environment.
Ability to work effectively in a dynamic and fast-paced environment.
Similar Jobs
Explore other opportunities that match your interests
Jobgether
Director of Compliance
sierra club