Perform daily reviews of security alerts and dashboards
Perform weekly log analysis and threat hunting
Detect and analyze security events and incidents
Coordinate escalations to internal response teams to ensure timely incident resolutions
Review threat intelligence from multiple sources
Maintain standard operating procedures, processes and guidelines
Automate security analysis, administration and remediation procedures, workflows and tasks
Assist with Incident Response
Help configure Mac and Windows laptops to meet security requirements.
Develop and maintaining information security metrics
Provide IT support to local staff and troubleshoot hardware and software issues.
Maintain awareness of trends in security regulatory, technology, and operational requirements
Preferred Qualifications
1-3 Years of experience in an information security operations or related roles.
Strong knowledge and experience working with Splunk, QRadar, SumoLogic or similar security information event management systems (SIEM) required
Experience with query and scripting languages
Experience with AWS security tools such as Guardduty, Inspector and Security Hub Experience with Crowdstrike Falcon or similar endpoint security suite required.
BA/BS or higher in Cyber Security, Computer Science, Information Technology, Management of Information Systems, or a related field
Excellent written and verbal communication skills Extremely organized and able to manage multiple, time-sensitive projects simultaneously
CISSP, CompTIA Security+, CEH, or similar certifications preferred