Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Truist Principal SOC Analyst 
United States, Georgia, Atlanta 
391582947

03.07.2024

Regular or Temporary:

English (Required)

The Principal SOC Analyst is an advanced SOC role within the 24/7 Cyber Fusion Center (CFC) organization. The role is responsible for hunting, monitoring, triaging, and escalating security events in any technology environment.This role will evaluate data collected from a variety of cyber defense tools (e.g., SIEM, IDS alerts, firewalls, network traffic logs, cloud platforms, and SOAR solutions) to analyze events that occur within their environments for the purposes of mitigating threats in mostly unstructured and complex situations. Individuals in this role are creative, proactive, and highly skilled in log, identity, cloud, network, and root cause analysis.This role is based on-site in downtown Atlanta, GA with on-call responsibilities.2nd Shift, 2pm to 11pm, Wednesday to Sunday (5-8)

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Conduct cyber investigations for escalated and challenging computer security incidentsinto root cause.

  • Develop tactical and strategic cyber intelligence fromacquiredthreat intelligence and technical indicators from external and internal sources.

  • Participatein the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.

  • Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.

  • Interface with other teams in Information Security (e.g.network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.

  • Identifynew threat tactics, techniques and procedures used by cyber threat actors.

  • Proactively engage in threat hunting activities to proactively search for threats in the enterprise environment.

  • The role is shift-based with weekend days and on-call supportrequired.

  • Positionis located in Atlanta on-site expectations in our downtown Cyber Fusion Center (CFC).

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Bachelor’s degree in Computer Science or related field or equivalent education and related training

2. Eight years of experience in Cybersecurity or related work

3. Broad knowledge of general IT with mastery of one or more of the following areas: operating systems, networking, computer programing, web development or database administration

4. Demonstrated advanced knowledge of cyber security operations with mastery of one or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation

5. Experience with systems for automated threat intelligence sharing using industry standard protocols, such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indication Information (TAXII) Advanced knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information

6. Ability to lead and persuade individuals and large teams on ideas, concepts and opportunities

Preferred Qualifications:

  • Bachelor’s degree in Computer Scienceor related field or equivalent education and related training

  • Eight years of experience in Cybersecurity or related work

  • Broad knowledge of general IT with mastery of one or more of the following areas: operating systems, networking, computer programing, web development or database administration

  • Demonstrated advanced knowledge of cyber security operations with mastery of one or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response,investigationsand remediation

  • Experience with systems for automated threat intelligence sharing using industry standard protocols, such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indication Information (TAXII) Advanced knowledge of processes,proceduresand methods to research, analyze anddisseminatethreat intelligence information

  • Ability to lead and persuade individuals and large teams on ideas,conceptsand opportunities

  • Experience working in cloud environments, namely Microsoft Azure

  • Working familiarity with programming best practices.

  • Industry certifications in general technology and security (e.g.Network+,Security+,CySA+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, etc.)

  • Industry certifications inincident responseandother related credentials

  • Industry certifications in networking, such as Cisco Certified Network Associate (CCNA), Certified Wireless Network Administrator (CWNA) and/or Net+ and experience in the Intelligence Community (IC)

  • Demonstratedtechnicalleadership experience


Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need