
Senior Security Operations Center Analyst
Long View Systems
full-time
Posted on:
Location Type: Hybrid
Location: Calgary • 🇨🇦 Canada
Visit company websiteSalary
💰 CA$69,960 - CA$91,822 per year
Job Level
Senior
Tech Stack
AWSAzureCloudGoogle Cloud PlatformITSMReactSplunk
About the role
- Actively participate in 24x7 operations of the Long View Security Operations Centre for L2 support
- Monitor, identify and validate security events generated from Security Information Event Management (SIEM) tools
- Actively work in monitoring, event and incident management tools like Sentinel and BMC Remedy
- Respond to critical business impacting situations and coordinate the efforts required to engage the proper resources to remediate the issue
- Coordinate major security incident situations and provide internal communications via email in a timely manor
- Provide general support for Security Information Event Management (SIEM) tool changes, tweaks, additions and updates within Sentinel and any additional tools leveraged by Long View
- Provide security guidance to team members across the organization how to best identify, contain and remediate security related incidents
- Understand complex issues across on-premise, public and private cloud solutions and articulate the impact to higher tier team members
- Follow and establish process documentation for receipt of security alerts for monitored devices, acknowledge the receipt of the event, opening and/or updating service desk tickets to track the handling of events to resolution and closure, assignment of the ticket to the appropriate owner
- Work with cloud technologies like Azure, AWS and Google Cloud Platform
- Fulfill reporting requests that can be pulled from Long View tools
Requirements
- 5+ years of professional experience in incident detection and response, malware analysis, or cyber forensics
- Extensive experience evaluating, interpreting, and integrating relevant data sources for the purpose of merging network attack analyses with counterintelligence and law enforcement investigations
- Experience with various IT service management tools including performance monitoring and ITSM solutions
- Experience with Security Information Event Management platforms like Sentinel, Splunk and Sumo Logic as well as XDR
- Experience working with incident, problem, change and service requests that follow ITIL framework standards
- Experience provisioning new client services and working through customer onboarding tasks
- Proven ability to troubleshoot and resolve technical and procedural issues
- Strong verbal and written communication which will allow you to communicate effectively to customers in non-technical terms
- Ability to react quickly and professionally with a sense of urgency
- Ability and desire to work on an on-call rotation for 24-hour support
Benefits
- Interesting work – Be part of exciting projects while accessing all the latest technologies
- Career growth – Permanent staff positions, paid training, career life planning, and relocation and travel opportunities
- RSP plan
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
incident detectionincident responsemalware analysiscyber forensicsdata integrationnetwork attack analysistroubleshootingITIL frameworksecurity incident managementcloud solutions
Soft skills
communicationproblem-solvingurgencyteam collaborationcustomer service