SOC Analyst
Kaseya® is the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide. Kaseya’s best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success. Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners www.insightpartners.com), a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve.
Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide. To learn more about our company and our award-winning solutions, go to www.Kaseya.com and for more information on Kaseya’s culture, please click here: Kaseya Culture.
Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. We have achieved record levels of success being BOLD, being GRITTY, being ACCOUNTABLE. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers, and the betterment of their careers and long-term financial wealth.
SOC Analyst– Miami, FL (onsite)
Are you ready to make an impact?
WHAT YOU’LL DO:
As a SOC Analyst, your role is pivotal in enhancing the security posture of our organization. You'll leverage your expertise to monitor and analyze security events, investigate incidents, and provide advanced threat detection and response. Collaborating closely with Tier 1 analysts and other security teams, you'll triage and escalate security incidents as necessary, ensuring timely resolution and minimizing impact. Your responsibilities include fine-tuning detection mechanisms, developing playbooks, and conducting thorough forensic analysis to identify root causes and mitigate future risks. Additionally, you'll contribute to continuous improvement initiatives by providing insights and recommendations based on your findings. Your proactive approach and technical proficiency are crucial in safeguarding our systems and data against evolving cyber threats.
WHAT WE ARE LOOKING FOR:
We are seeking a skilled SOC Analyst to join our team at RocketCyber. The ideal candidate will possess a strong background in cybersecurity and experience in incident detection, analysis, and response. Key attributes include proficiency in security monitoring tools, the ability to analyze and interpret security logs, and a proactive mindset in identifying and mitigating security threats. Excellent communication skills and the ability to collaborate effectively with cross-functional teams are essential. The ideal candidate should also demonstrate a commitment to staying updated on emerging threats and technologies to ensure our organization remains resilient against cyber threats.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
- Monitor, Analyze and Triage systems and events across Windows, macOS and Linux in a 24x7 operations environment in support of Tier I analysts OR independently review, assess, and act.
- Identify suspicious/malicious activity spanning Firewalls, Office 365 & Azure AD.
- Perform deep-dive incident analysis by correlating data from various sources and determine if a critical system is affected.
- Perform static and dynamic malware analysis.
- Perform offensive and defensive testing in virtual environments.
- Perform incident detection, response & remediation, threat hunting, digital forensics, and configure alerting rules.
- Identify and propose areas for improvement.
- Work independently and have a strong attention to detail and excellent documentation skills.
- Manage and delegate tasks to other team members.
WHAT YOU’LL BRING:
- Undergraduate or Masters in Cybersecurity, Management and Information Systems, Information Technology, Computer Science, or other related fields OR 2+ years of relevant SOC work experience and a Bachelor’s degree.
- CEH, CySA+, eJPT, PNPT, OSCP, CISSP (one or more).
- Knowledge of security technologies such as SIEM, SOAR, EDR, FW, IPS/IDS, Sandboxes.
- Knowledge of various firewalls, syslog, and other network log formats.
- Knowledge of network and common cryptographic protocols.
- Scripting experience with PowerShell, Bash, Java, Python or C++
- Have excellent written and verbal communication skills.
- Ability to work non-standard work hours including nights and weekends.
- Must be authorized to work within the US and not require sponsorship in the future and pass a background check.