Plurilock

SOC 2 Analyst

Plurilock

contract

Posted on:

Location Type: Remote

Location: Australia

Visit company website

Explore more

AI Apply
Apply

About the role

  • Investigating security incidents and determining their root causes
  • Reviewing incidents escalated by Tier 1 analysts
  • Using threat intelligence to assess alerts, threats and potential incidents in depth
  • Monitoring systems and events across different operating systems (Windows, macOS, Linux)

Requirements

  • 5+ years recent experience as Tier 2 or 3 analyst at a large organization
  • Strong, demonstrated SIEM and data correlation experience
  • Demonstrated experience designing new SOC use cases and working with vendor on implementing new use cases
  • Experience designing and implementing runbooks and use cases to mitigate security incidents
  • Experience designing Incident Response plan, including alert definition, runbooks, escalation, etc.
  • Extensive experience reviewing and managing alerts in Microsoft Defender, Splunk and or Crowdstrike
  • Experience conducting hunts across disparate data sets, to include host data, vulnerability data, threat data, network data, active directory data, among others to identify threats
  • Experience leading timely security operations response efforts in collaboration with stakeholders
  • Experience documenting incident response communications for technical and management audiences
  • Experience setting up alert rules and effective alert management
  • Demonstrated ability to create runbooks and conducting investigations with key application, IT Infra and other stakeholders
  • Experience designing custom SOC SIEM use cases in Defender, Splunk and CRWD
  • Experience conducting forensic work investigations
  • Problem solver
  • Curious
  • Analytical, qualitative and quantitative abilities
  • Adaptive to dynamic environment
  • Strong security operations documentation abilities.
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
SIEMdata correlationincident responserunbooksthreat intelligenceforensic investigationsalert managementsecurity operationscustom SOC use casesincident investigation
Soft Skills
problem solvingcuriosityanalytical abilitiesqualitative abilitiesquantitative abilitiesadaptabilitydocumentation skillscollaborationcommunicationleadership