The SOC Analyst is responsible for a broad range of responsibilities with a primary emphasis on 24/7, Log analysis, threat and event monitoring and data loss prevention to contribute to effective remediation of security incidents.
Duties & Responsibilities:
? Be part of the primary service relationship interface between customers and TIM SOC Operations. ? Support in carrying out SOC-as-Service project system implementations for customers using the IT service management framework, which involves the whole ITSM and ITIL Framework.
? Monitors alert, health of security sensors and endpoint from SIEM.
? Collects data and context necessary to initiate Incident Response work.
? Creates tickets and ensure regular update to tickets is being performed.
? Escalates to SOC Specialist Level 2 items that has been categorized as actionable information security incidents.
? Perform other duties and functions deemed necessary for TIM SOC Unit.
Qualifications:
Education:
o Must be a graduate of Computer Studies/Computer Engineering/Information Technology/Electronics Engineering or equivalent
Experience:
o With at least 1-2 years working experience in a SOC Operations environment
o Must have at least 1 significant certification (CCNA Routing & Switching, CCNA Wireless, CCNA CyberOps, CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), EC Council Computer Hacking Forensics Investigator, EC Council: Certified Ethical Hacker (CEH), ITIL, Windows Admin, Linux Admin, Customer Service)
Skills & Competencies:
o Familiarity (1-2 years experience) on the following: