SOC Analyst

Job Description 

The primary duty is to ensure the organization’s digital assets are secure and protected from unauthorized access and being responsible for hunting, detecting, and responding to digital security threats, specifically for IoT devices and applications. 

Roles and Responsibilities

  • Specialize in the analysis of IoT device and agentless host security monitoring, troubleshooting and mitigation.
  • Perform network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM).
  • Perform daily response operations on a schedule that may involve nontraditional working hours.
  • Curate signatures, tune systems/tools, and develop scripts and correlation rules.
  • Analyze host and network forensic artifacts and identify patterns and behaviors related to threat actors.
  • Lead technical aspects of incident detection, prioritization, and response.
  • Mentor and train incident responder and incident responder specialists.
  • Collaborate and generate documentation for knowledge sharing & transfer with other analysts, populated in our internal knowledgebase(s).
  • Contribute to incident response automation within SOC tools (SOAR, SIEM, etc.).
  • Interface with user community to understand their security needs and recommend actions to accommodate client requirements.

Requirements:

  • Bachelors degree in Computer Sciences, Cyber Security or STEM majors.
  • Experience – 1 year or fresh graduates with strong cyber security academic knowledge are encouraged to apply.
  • Candidates must be proficient in written and verbal English communication.
  • Should have technical experience with Windows, UNIX, and Linux operating systems; network protocols and packet analysis tools; anti-virus and anti-malware, IDS/IPS, penetration, and vulnerability testing.
  • Should have practical experience with vulnerability management of IoT devices, host forensics and network analysis techniques and tools, malware and reverse engineering, responding to threats in cloud platforms (AWS, Azure, Google, etc.), C, C++, C#, Java or PHP programming languages.
  • Should have a detailed understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.), APT, Cyber Crime and other associated tactics CISSP, CISM or related SANs or Industry certifications; Security Information and Event Management (SIEM/SOAR); TCP/IP, computer networking, routing and switching; and Firewall and intrusion detection/prevention protocols.

Apply Now

Please mention the job opportunity you are applying for in “Subject”.

    Our Esteemed Clients

    We are here

    Karachi
    No. 46-D Street No. 46, PECHS Block-6, Off Shahrah-e-Faisal,
    Karachi, Pakistan
    Karachi, Pakistan
    Office Timing
    9am-530pm (Mon-Fri)
    Karachi, Pakistan
    (+92) (21) 111-111-477
    info@hrsgonline.com

    Lahore
    169-Y, Commercial Area, Phase-III, DHA, Lahore, Pakistan
    Karachi, Pakistan
    Karachi, Pakistan
    Office Timing
    9am-530pm (Mon-Fri)
    Karachi, Pakistan
    (+92) (42) 35740973-74
    info@hrsgonline.com

    Islamabad
    3 –A, Idrees Market, Sector F-10/2,
    Islamabad, Pakistan
    Karachi, Pakistan
    Karachi, Pakistan
    Office Timing
    9am-530pm (Mon-Fri)
    Karachi, Pakistan
    (+92) (51) 2153290
    info@hrsgonline.com

    Dubai
    Office 1905, 19th Floor, Latifa Tower, Sheikh Zayed Road,
    Dubai, UAE
    Karachi, Pakistan
    Office Timing
    9am-530pm (Mon-Fri)
    Karachi, Pakistan
    (+971) (4) 492-8866
    info@hrsgonline.com

    New Jersey
    7 Golden Pond Drive, Milltown NJ 08850, New Jersey, USA
    Karachi, Pakistan
    Karachi, Pakistan
    Office Timing
    9am-530pm (Mon-Fri)
    Karachi, Pakistan
    (+1) (609) 310-6057
    info@hrsgonline.com

    At HRSG, we work, build, and move forward together
    and consequently, deliver better.