Senior Security Analyst position at Logicalis, responsible for detection engineering, threat hunting, incident response, and collaboration. The ideal candidate has 8-10 years of experience in SOC and MSS environments, with expertise in Splunk, QRadar, Azure Sentinel, and Devo technologies.
Requirements
- At least 8-10 years of working experience in SOC and MSS environments
- Bachelor's degree in computer engineering, Computer Science, Cyber Security, Information Security, or other equivalents
- Excellent hands-on experience in implementations, incident analysis of Splunk, IBM QRadar, Azure Sentinel SIEM (Security Information and Event Management) & Devo technologies
- Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if CrowdStrike, Microsoft Defender.
- Hands on experience on SOAR (Security Orchestration, Automation, and Response) technologies
- Experience in malware analysis for Windows and Linux/Mac
- Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet
- Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with proven Unix (Solaris, Linux, BSD) experience
- Knowledge of any shell scripting language and applying it to automate mundane operations tasks
- Knowledge of current cyber threats, attack vectors, vulnerabilities, and threat intelligence feeds
- Ability to work effectively in a team environment, collaborate cross-functionally, and mentor junior analysts
- Candidate should have at least one SANS certification. Preferred if that is GCIH
- Good understanding of basic network concepts and advantages of exposure to cloud technologies
- Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL (Information Technology Infrastructure Library) standards
Benefits
- Generous Paid Time Off
- 401k Matching
- Retirement Plan
- Relocation Assistance