Cyber Security Engineer || Remote Project || Client: Grammarly || GC & USC Only.. at Remote, Remote, USA |
Email: [email protected] |
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=469911&uid= IMPORTANT REQUIREMENT: Cyber Security Engineer || Remote Project || Client: Grammarly || GC & USC Only.. Role: Cyber Security Engineer (SOC Analyst) Location: Remote Duration: 6+ months MOI: Phone/Sky IMPORTANT REQUIREMENT: Cyber Security Engineer || Remote Project || Client: Grammarly || GC & USC Only.. Role: Cyber Security Engineer (SOC Analyst) Location: Remote Duration: 6+ months MOI: Phone/Skype Visa: GC/USC Need LinkedIn profiles. Assessment is needed and is must. Candidate must be ready and comfortable to give the assessment. Please check before submitting. Job Description: Recognizes that said outcomes begin and end with our people, and that is what we have built, a community of like-minded, driven, and passionate individuals and innovators who are aligned in a common goal of delivering top-tier services to our customers. Grammarly is seeking a highly-motivated and detail-oriented Tier 1 SOC Analyst to join our Security Operations Center (SOC) team. As an L1 SOC Analyst, you will play a crucial role in monitoring, detecting, and responding to security incidents to ensure the protection of our client's assets. This is an exciting opportunity to work in a fast-paced environment and contribute to the ongoing success of our cybersecurity operations. As a Grammarly candidate will receive access to the full knowledge base which is driven by the Grammarly community as well as the technical backing of the entire PS team. Grammarly encourages collaboration and growth through information sharing and knowledge workshops. The candidate will also have access to our internal Slack channel to stay connected with the team as well as the necessary tools to train, demo, test, and grow their professional skills. Years of Experience: 8+ years JOB RESPONSIBILITIES L1 SOC Analyst Responsibilities Monitor security event logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems. Conduct initial triage and investigation of security incidents, following established procedures and guidelines. Escalate and collaborate with Tier 2 and Tier 3 SOC Analysts, Incident Response teams, and the SOC Lead/Program Manager to ensure timely and effective incident response, resolution, and reporting. Provide first-level analysis of security events, performing data analysis and correlation to identify potential threats and vulnerabilities. Generate and maintain accurate documentation of security incidents, including incident reports, investigation findings, and remediation actions. Monitor threat intelligence sources and stay informed about the latest security vulnerabilities, exploits, and attack techniques. Participate in shift rotations to provide 24/7 coverage of the SOC operations. Develop and continuously improve SOC processes and workflows to enhance detection and response capabilities, and assist in the documentation of SOC processes. Participate in tabletop exercises and incident response drills to test and validate the effectiveness of SOC procedures. An ideal candidate would also have the following skills: Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field (or equivalent experience). Proven experience (2+ years) in a SOC or security-related role, with a focus on incident monitoring, analysis, and response. Familiarity with security technologies and tools such as SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection systems. Understanding of common network protocols (TCP/IP, DNS, HTTP, etc.) and their role in security monitoring. Knowledge of security incident response methodologies and best practices. Familiarity with various operating systems (Windows, Linux, etc.) and their security features. Basic understanding of malware analysis and its impact on security incidents. Strong analytical and problem-solving skills, with the ability to work under pressure and meet tight deadlines. Excellent communication skills, both written and verbal, with the ability to effectively document and report on security incidents. Security certifications such as CompTIA Security+, GCIH, or GCIA are highly desirable. Experience with threat hunting and proactive detection techniques. Familiarity with log analysis and familiarity with log management tools. Understanding of common cybersecurity frameworks such as NIST, ISO 27001, or CIS Controls. Knowledge of scripting languages (Python, Power, etc.) for automation and data analysis. Familiarity with cloud platforms and their impact on SOC operations (e.g., AWS, Azure, GCP). Ability to work collaboratively in a team environment and effectively communicate with technical and non-technical stakeholders. Continuous learning mindset and a passion for staying up to date with the latest cybersecurity trends and technologies. REQUIRED EDUCATION Master's degree in Computer Science, Computer Engineering, Technology, Information Systems (CIS/MIS), Engineering or related technical discipline, or equivalent Thanks & Regards Aayush Sharma VOTO CONSULTING LLC [email protected] || 201 331 7215 || 1549 Finnegan Lane, 2nd Floor, North Brunswick, NJ, 08902 http://www.votoconsulting.com https://www.linkedin.com/in/aayush-sharma-399087239 Keywords: green card New Jersey http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=469911&uid= |
[email protected] View All |
08:02 PM 01-Aug-23 |