Share this job with your friends, family and co-workers...
THIS JOB ADVERT HAS EXPIRED...
SOC ANALYST L3 (QRADAR) - 312410
SOC ANALYST L3 (QRADAR)
Information Technology / Web Development / Telecommunications
Wage / Salary:
R - Market Related - P/M (Per Month)
SOC Analyst L3 (QRadar)
Description of responsibilities:
Supports the Threat and Vulnerability Assessment team with reporting, management, and remediation of threats against customers.
Conduct cyber intelligence operations including intelligence collection, tracking threat actors, identifying malicious behaviours and operations.
Participates on Incident Response teams as threat/forensic SME (Subject Matter Expert).
Perform network traffic and anomaly analysis, as well as indicators of compromise from system logs (Unix & Windows), application/database and firewall logs, IDS/IPS alerts, WAF alerts, endpoint malware alerts.
Manages multiple investigation requests through the entire lifecycle of initiation, data collection, analysis, and data production.
Performs assessments of security profiles and correlates vulnerability data with network topology information to quickly identify risks.
Recommends and tracks the application of fixes, security patches and security updates on various levels.
Produces recommendation reports on patches, exploits and vulnerabilities.
Works with customers, vendors and internal resources for problem resolution and security advisories.
Standardizes process and procedures and provides continual improvement.
Develops and maintain comprehensive documentation on incidents and analysis for clients and internal.
Compile security advisories for internal and external in document format with technical recommendations.
Use case writing, development and refinement for detection of threats.
Proactively search for rogue behaviour, malicious attacks & suspicious activity.
Training of junior analysts.
Analyse threat feeds to produce daily/weekly/monthly Threat Intelligence brief and regular threat trend reporting.
Qualifications and experience required:
BSC degree in relevant field/technology (or equivalent years of experience) and minimum of 4 years of related experience
CISSP, CEH, GPEN, OSCP or similar security certifications
Experience with threat assessment, vulnerability analysis, risk assessment, information gathering, correlating and reporting
Experience analysing phishing attacks
Significant experience in network intrusion detection
Experience creating specific mitigation tactics such as IDS signatures
Experience producing reports and briefs on the current threat landscape and associated risks
Experience with conducting vulnerability assessments using tools like Tenable or similar
Experience on threat intelligence feeds in terms of application and usability
Experience monitoring third party security related websites, forums and social media sites for information regarding vulnerabilities and exploits
Experience conducting malware analysis – usage of VirusTotal etc
Experience using common sandbox technologies to perform dynamic malware analysis
Experience replicating reported vulnerabilities in a safe and contained environment to develop proof of concept and/or exploit tools
Certification in IBM Qradar essential
Kindly regard your application as unsuccessful if you have not heard from the agency within 2 weeks.