Cloud SOC Analyst
Overview
Placement Type:
Temporary
Salary:
$59.99 to $66.66 an hour.
Start Date:
01.13.2025
Our Opportunity:
Client’s Security & Technology Operations organization is seeking an Information Cyber Security Analyst for the Security Operations Center. The selected candidate will participate in a 24x7x365 team that monitors, analyzes, and responds to information security related threats such as commodity malware, policy violations, and advanced persistent threats. Members of the SOC are also tasked with supporting the efforts of the Threat Intelligence, Risk Management, and Forensic teams. The successful candidate will be a highly technical, passionate, and self-driven individual who loves to learn, solve problems, and contribute to the advancement of the team.
What you’ll do:
- Monitor and analyze alerts from cloud security tools (e.g., AWS Security Hub, Microsoft Defender for Cloud, Google Chronicle).
- Investigate and respond to potential security incidents within cloud environments.
- Perform log analysis using SIEM tools such as Splunk, Google SecOPS.
- Lead and coordinate the response to cloud-related incidents, including containment, remediation, and root cause analysis.
- Create detailed incident reports and recommend preventive measures.
- Assess and improve the organization’s cloud security posture using tools like Prisma Cloud, AWS Config, or Azure Security Center.
- Identify and remediate cloud misconfigurations.
- Develop and use custom detection rules and scripts.
- Work closely with DevOps, IT, and other security teams to ensure secure cloud configurations.
- Provide guidance and training to junior analysts on cloud security best practices.
- Support audits and ensure compliance with frameworks like CIS, NIST, ISO 27001.
- Maintain dashboards and regular reports for senior management.
What you have:
- 3-5 years of experience in cybersecurity, with at least 2 years in cloud security or SOC roles.
- Hands-on experience with one or more cloud platforms (AWS, Azure, GCP).
- Hands on experience with CSPM solutions (Prisma)
- Proficiency in SIEM tools and cloud-native security tools.
- Strong knowledge of security frameworks (MITRE ATT&CK, NIST CSF, CIS Benchmarks).
- Familiarity with scripting languages such as Python, PowerShell, or Bash.
- CompTIA Network+ or equivalent knowledge/experience required.
- CompTIA Security+ or equivalent knowledge/experience required.
- Detailed knowledge of packet structure and previous experience performing in-depth packet analysis required.
- Thorough understanding of information security best practices and technologies.
- Detailed knowledge regarding the administration, use, securing and exploitation of common operating systems.
- Prior experience analyzing log sources originating from security and networking devices such as firewalls, routers, proxy, anti-virus products, and operating systems required.
- Strong proficiency with Windows and Unix/Linux command line.
- In-depth knowledge of obfuscation techniques used to encode/encrypt malicious traffic/data.
- Familiarity with a standardized incident response framework (SANS/NIST).
- Research and analytical background and an analytical approach; especially with respect to event classification, event correlation, and root cause analysis.
- Must be able to react quickly, decisively, and deliberately in high stress situations.
- High level of ethics and core values.
- A strong passion for learning.
- Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers.
- Self-disciplined to ensure completion of shift work with little supervision. Highly motivated individual with the ability to self-start, prioritize, and multi-task.
Preferred but not required:
- Relevant certifications: AWS Certified Security Specialty, Microsoft Certified: Azure Security Engineer Associate, CCSK, CCSP, Cloud Security Essentials or similar.
- Experience with automation tools like Terraform, Ansible, or CI/CD pipelines.
- Knowledge of Zero Trust and micro-segmentation principles.
The target hiring compensation range for this role is $59.99 to $66.66 an hour. Compensation is based on several factors including, but not limited to education, relevant work experience, relevant certifications, and location.
Client Description
Are you ready to join a prestigious financial services firm that prioritizes client success and innovation? Our client is a leading provider of investment and wealth management services, known for its commitment to transparency, integrity, and personalized advice. With a focus on empowering clients to achieve their financial goals, our client offers a dynamic and collaborative work environment. Join us in our mission to help individuals and families build a brighter financial future.