Hewlett Packard Enterprise

L3 SOC Analyst

Hewlett Packard Enterprise

full-time

Posted on:

Location Type: Hybrid

Location: GalwayIreland

Visit company website

Explore more

AI Apply
Apply

About the role

  • Monitor work queues for new escalations from the L1/L2 team
  • Triage cases when there are multiple escalations in the queue
  • Perform deep-dive analysis on escalated cases
  • Uses Threat intelligence and IOA/IOC data to identify source and impact of attack
  • Clearly document your investigations as they progress and regularly add case notes to the case to maintain situational awareness
  • Complete the investigations and recommend remediations for low and medium severity security incidents
  • Initiate a war room for confirmed or suspected critical security incidents and follow the documented incident response plan
  • Complete Post Incident Review (PIR) documentation for all medium and higher severity security incidents
  • Monitor work queues for new cases requiring review
  • Triage case reviews as required
  • Review cases completed by L1 analysts for quality, accuracy, and completeness
  • Immediately investigate any you suspect to be true security incident falsely closed in L1/L2
  • Provide feedback, guidance and mentoring to L1/L2 analysts where appropriate to improve their initial investigation skills
  • Recommend exceptions or changes to detection rules to reduce false-positive detection
  • Time permitting, perform proactive reviews of open and acknowledged events currently being triaged by the L1 team
  • Assist the peer L3 team in scheduled threat hunting activities
  • Develop queries or other methods for detecting new or previously undetected exploits, tactics, and techniques. Work with the Engineering team to implement these detections.
  • Maintain situational awareness by: Being aware of new and emerging threats, including vulnerabilities, threat actors, tactics, and techniques
  • Actively participate in end-of-shift handovers of ongoing and recently closed investigations
  • Keeping meticulous notes of investigations of confirmed and suspected security incidents
  • Reviewing vulnerability scan data for all customer sites monthly, and being aware of any areas of additional risk (accepted or new) to the organisation
  • Develop and update playbooks, KB articles and training material as appropriate
  • Review documentation created by L1/L2 analysts for completeness and accuracy.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field or equivalent experience desired.
  • Generally, 5+ years in SOC, Incident Response, or Threat Analysis roles.
  • Strong knowledge & understanding of common attack vectors and threat actor tactics, techniques, and procedures.
  • Knowledge of Elastic SIEM is preferred. If not experience on any of the other SIEM tools like Sentinel, Splunk, QRadar, LogRhythm.
  • Relevant industry qualification where applicable.
  • Excellent verbal and written communication skills in language to be supported.
  • Advanced troubleshooting skills in a technical environment.
  • Excellent analytical and problem solving skills.
  • Advanced Software and hardware knowledge of computing, storage and peripheral devices.
  • Specific knowledge and training with the company's products.
  • Knowledge of multiple product lines (for example, proactive, reactive, storage, enterprise systems, tier 2 or 3 support, etc.).
  • Advanced proficiency with case management databases and tools.
  • Superior customer service skills.
  • Phone and remote support experience.
  • E-support experience, knowledge and resolution ability.
  • Ability to solve and document solutions for usage of other technicians and customers.
  • Ability to mentor new agents.
  • Ability train peers on solutions.
  • Ability to take full ownership for resolution with escalated customers.
  • Ability to lead technical action plans.
  • Lead or provide expertise to teams or projects.
  • Highly Developed knowledge of more complex solutions.
Benefits
  • Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.
  • Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division.
  • Unconditional Inclusion We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
threat intelligenceIOAIOCincident responsevulnerability scanningElastic SIEMSentinelSplunkQRadarLogRhythm
Soft Skills
communication skillsanalytical skillsproblem solvingmentoringcustomer servicetroubleshootingownershipleadershipguidancetraining
Certifications
Bachelor’s degree in CybersecurityBachelor’s degree in Information TechnologyBachelor’s degree in Computer Sciencerelevant industry qualifications