Job Purpose:
Part of the Logicalis Managed Security team, the Security Senior Analyst role is responsible for
managing services for Managed Security Service customers. The Security Specialist has the remit
of assessing, discovering and directing remediation of security threats & vulnerabilities within client
environments whilst working as part of a managed security team on various cyber security projects
and tasks.
This role involves working at all levels with Solution Architects, Development Operations, Engineers, SOC Analysts, clients and other stakeholders in building and managing security architecture and systems which are kept up-to-date and relevant in the rapidly evolving Managed Security Services industry.
This is a senior technical role and the role holder is expected to provide 3rd and 4th line support for
the current service platforms and services as well as supporting, mentoring and coaching
colleagues. In addition, there will be a requirement to liaise with channel partners and vendors..
Key Accountabilities:
Handle internal and client escalations by engaging with key stakeholders
Follow & oversee that the team follows published SOC policies and procedures
Be a subject matter expert across Managed Security Service and be able to clearly articulate deliverables, limitations, feasibility, etc.
Thorough experience of the configuration, tuning and maintenance of SOC tools to improve detection capability and building re-usable visualisations / dashboards for security alert triage, threat hunting and similar use cases, etc.
Develop Standard Operating Procedures (SOPs) and use cases for monitoring and handling different types of security events
Threat intelligence gathering to ensure that detection methods are effective against current threats
Hunt for suspicious activity based on anomalous activity.
Handling events as part of the Security Incident Management Process
Work with both internal and external partners to investigate and advise on security incidents and anomalies
Prepare detailed reports, providing information on findings, status and progress of investigations, as well as vulnerability and risk factors
Serve as the senior technical escalation point and mentor for colleagues.
Produce incident response playbooks to drive a consistent approach to handling common incidents and improve operational processes.
Analysing structured security log data through the creation of aggregated / correlated reports or visualisations.
Identify and implement opportunities for innovative and continuous improvement
Lead on customer incident response investigations and containment of threats, advising on remediation
Participate in the Security Operations Centre on-call rotation
Skills and Attributes for Success
Excellent technical skills, knowledge and understanding of the Logicalis Managed Security Services portfolio, IT Applications, Networking and infrastructure
Demonstrable ability to think beyond the immediate situation and use critical thinking, context and judgment in the analysis of complex data sets and events. Actions will vary but most often will require development of a course of action or response to identified threats
Ability to work under pressure including crisis situations while maintaining a high degree of attention to detail
Experience responding to customer requests including senior management and executives
Ability to quickly learn and adapt to new technologies and processes in a rapidly changing environment
Excellent written and oral communication skills
Self-motivated to improve knowledge and skills
People orientated
Goal and outcome focused
Clear communicator
Positive “can-do” attitude
An example of integrity
A mind-set of continual service improvement
Excellent inter-personal skills
Qualifications & Experience
Must meet or be eligible to obtain U.S. Government Security Clearance
Typically 5+ years experience in IT Security including security operations and being a Sr/lead analyst in a SOC/MSSP or mature internal team
Analysing & reviewing security logs from a range of sources, including SIEM - ideally Microsoft Sentinel, Splunk (Arcsight/Qradar/Logrhythm etc), IPS/IDS, Endpoint Security (e.g. Carbon Black); Windows Eventlog
Threat Intelligence - in the context of using it in a Security Operations environment
Securing services migrated to cloud platform (AWS/AZURE etc) preferred
Industry recognised certifications such as: SANS GIAC GCIA, GCIH, GCFA, GNFA, GCTI, GREM or CEH, CISSP etc
A related professional certification, for example; CISSP, CISM, CISA
Solid IT and/or technology background
Awareness of industry standards – PCI-DSS, ISO 27001, GPG 13 etc. etc.
Awareness of common exploits and vulnerabilities
Solid network engineering and server architecture awareness
Previous hands on experience in network/server and security operational roles
Salary Compensation Range: $90,300 to $121,900