Under Attack?

TsaroLabs - Security Integrated

Cyber Security Analyst – Security Operations L1

Summary: 

As a Security Analyst, you will be responsible for security event analysis, Incident response planning and related activities assisting our customers. The security analyst, Level 1, works within the SOC (Security Operations Center) and is responsible for the monitoring of systems, investigating root causes, and coordinating with team  engineers for analysis and response. The security analyst works using log data as well as many security tools, and ticketing systems.

Minimum Experience: 5-8 years

Roles:

  1. Monitor alerts automatically generated by security systems
  2. Monitor threats and new attack techniques being disclosed in the wild
  3. Investigate events to determine if they are true events or false positives
  4. Communicate policies with end-users
  5. Create new ways to search for potentially suspicious events on systems
  6. Participate in projects to improve security monitoring toolkits as well as to improve defensive controls
  7. Provide different types of data to measure security and compliance

Required Skills:

  1. Strong understanding of security concepts on networks, Window, Linux, web applications.
  2. Strong understanding of networking concepts, Shell / Python Scripting.
  3. Ability to multi-task under strict deadlines.
  4. Security detection and analysis tools (SIEM, Nexpose, Nessus, ect…)
  5. Network infrastructure (internet, tcp/ip, ect…)
  6. Web protocols (http, DNS, ect…)
  7. Professional, writing, and interpersonal skills.
  8. Ability to learn, work effectively and contribute within a team environment.
  9. A demonstrated passion towards information security.
  10. Experience with some security tools.
  11. Strong Experience of using open- source tools and commercials tools such as but not limited to Burp Suite, Metasploit, Nessus, Acunetix and open source with operating systems Windows and Linux.
  12. Expertise and experience of conducting VAPT (Vulnerability Assessment and Penetration Testing) as per standards such as OWASP Top 10, SANS Top 25 and WASC, NIST.
  13. Perform research on new vulnerabilities, attack vectors, exploits, tools and industry trends for the above- mentioned services.
  14. Knowledge of MITRE ATT&CK framework and the different tactics
  15. Good knowledge of cyber-security technologies, endpoint and server security concepts, and preferably public cloud experience (AWS, Azure, GCP).
  16. Ensure Documentation included in CDC / SIEM work log as predefined / agreed standards. Learn from review process for continuous improvement

Certification Requirements:

  1. CEH Certification Mandatory.
  2. CompTIA Security Plus is preferred. 
  3. Candidates with CISM, CISSP, GCIH, GCFE, OSCP are preferred.

Apply Now

    Get a Consultation

    Discover the many ways to enhance your organization security posture with TSARO Labs
    Select service*