- Company Name
- Darden
- Job Title
- Sr. Cybersecurity SOC Analyst
- Job Description
-
Job Title: Sr. Cybersecurity SOC Analyst
Role Summary:
Lead the detection, investigation, and response to advanced cyber threats within a large enterprise, providing expertise to SOC operations, threat hunting, forensics, and security automation while mentoring junior analysts.
Expectations:
- 7+ years in information security, 4+ years in incident response.
- CISSP plus two additional relevant certifications (e.g., CCNA/CCNP, CEH, GIAC, EnCE).
- Proven proficiency in SIEM/SOAR, threat intelligence, and MITRE ATT&CK/Kill Chain frameworks.
Key Responsibilities:
- Serve as backup SOC queue manager and escalation point for complex alerts.
- Triage, investigate, and remediate security events; conduct correlation across internal/external data sources.
- Lead threat hunting and forensic investigations, create SIEM searches, YARA rules, regex, and custom apps.
- Translate defensive measures into actionable changes with engineering teams.
- Mentor junior SOC staff and develop SOC playbook, metrics, and post‑incident reviews.
- Participate in 24/7 on‑call rotation; maintain SOAR and forensic tools.
- Evaluate and recommend security technology improvements.
Required Skills:
- Deep knowledge of network, application, vulnerability management, forensics, and penetration testing.
- Expertise in SIEM/SOAR, SOAR tool implementation, Linux/Windows, PowerShell/Python/Perl scripting.
- Strong command of TCP/IP, DNS, firewalls, IDS/IPS, endpoint protection, VPN, encryption, authentication.
- Ability to craft queries, YARA rules, regex; analyze threat intelligence and IOC creation.
Required Education & Certifications:
- Bachelor’s degree in Computer Science, Information Technology, or related field.
- CISSP (mandatory) and at least two additional current security certifications (e.g., CCNA/CCNP, CEH, GIAC, EnCE).