Sr. Staff Cybersecurity Analyst – SOC

Job Expired
Date: Mar 10, 2022
Location: Remote, OR, US
Req ID: 163893

Job Responsibilities

  • Explore opportunities for SOC maturity improvement and automation capabilities
  • Identifying and implementing additional SIEM use cases
  • Facilitate relationship between CSOC and tier one MSSP
  • Actively participate in researching trends and current countermeasures for cyber security vulnerabilities, exploits, and other malicious activity
  • Act as a liaison between the CSOC and Incident Response Team, serving as a point of escalation for tier one CSOC security events
  • Assist in creation and maintenance of documentation for CSOC procedure and processes
  • Contribute to the development and improvement of security monitoring and incident response processes and solutions as required to support Lam’s cyber security program
  • Drive the outcomes of lessons learned to further the security posture of the business through additional security projects
  • Create security awareness through informational campaigns with business stakeholders
  • Provide security monitoring and incident response services supporting the mission to protect Lam and its customers’ information assets
  • Solid foundation in technical domains such as: Networking, firewalls, systems administration, application development, cloud computing, and information security best practices
  • Position can sit in Tualatin Oregon or 100% remote from any location

Minimum Qualifications

  • Bachelor’s degree or Advanced Degree in Computer Science, Information Technology, Cybersecurity, or related discipline
  • 5+ years of experience in Information Security role
  • 2+ years of Security Operations Center Experience
  • At least one of the following processional certifications required: Security+, CISSP, CISA, CISM, CEH, OSCP, GMON
  • Certifications preferred but not required: CCNA, Linux+, Azure Administrator, Azure Security Engineer
  • Knowledge in one of the areas of endpoint security, cloud securitynetwork securitythreat hunting, threat analysis, Digital Forensics and Incident Response (DFIR), and intrusion detection and intrusion prevention
  • Security monitoring experience with one or more SIEM technologies such as Azure Sentinel, Splunk, QRadar, etc.
  • Strong understanding of security incident management and response lifecycle
  • Familiar with Windows and Linux operating systems as well as OS security best practices
  • Strong verbal and written communication skills
  • A self-motivated person that can use their creative and experience-driven investigation skills to solve problems

Preferred Qualifications

  • Experience with computer lab environments and operational technology (OT) preferred
  • Hands on experience with Microsoft security technologies such as Microsoft Defender for Endpoint, Microsoft Cloud App Security, and Azure Sentinel
  • Experience with digital forensics, penetration testing, threat intelligence, malware analysis, or reverse engineering
  • Experience with Kusto Query Language (KQL)
  • Experience with a scripting language (Python, Bash, PowerShell, etc.)

Our Commitment

We believe it is important for every person to feel valued, included, and empowered to achieve their full potential. By bringing unique individuals and viewpoints together, we achieve extraordinary results.

All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.

We Look Forward to Your Application

Nearest Major Market: Eugene
Job Segment: Engineer, Information Systems, Cisco, Cloud, Computer Science, Engineering, Technology

More Information

  • This job has expired!

Leave your thoughts

Share this job