Responsibilities
Responsible to triage cyber security incidents as a member of Security Operations Center incident responders’ team first line.
- Continuously monitors the operating systems alert queue; triages security alerts; monitors health of operating systems security sensors and endpoints; collects data and context necessary to escalate to Tier 2 Analyst.
- Continuously monitoring the operating systems alert queue using multiple tools, such as SIEM, EDR and custom-built system monitoring tools.
- Continuously monitors health of operating systems security sensors.
- Conduction initial triage of alerts to identify potential, false positives, policy violations, intrusion attempts and compromises on the system level.
- Consolidating data from alert triage to provide context necessary to escalate to Tier 2 Analyst.
- Escalate to Tier 2 Analyst with all necessary data for deeper analysis and review.
Should have good knowledge of security tools as follows:
- Knowledge about MS Windows and UNIX based systems
- Knowledge TCP/IP version 4 and version 6
- Security Event and Incident Monitoring System (SIEM), Orchestration tool and playbook response concept, Endpoint Detection and Response tool (EDR), Anti-malware systems, Intrusion Detection and Prevention Systems, Firewalls.
Required industry certificates:
- Comp TIA CySA+ certificate – Cyber Security Analyst Certification - in good standing
- Incident Response Fundamentals certificate – in good standing
Recommended industry certificates:
- Analyst/Administrator for any SIEM solution industry leaders
- Some of SANS, GIAC, ISACA, (ISC)2 certificates or trainings