SOC Analyst Resume
Headline : As a SOC Analyst, reporting to the Security Operations Manager, the SOC analyst will operate a SIEM platform as part of a SOC team.
Skills : Cybersecurity Knowledge, Threat Detection and Analysis
Description :
- Responsible for the execution/ adherence to day-to-day operations / daily checks/processes.
- Acted as a subject-matter expert specifically for SIEM and related/dependent technologies (log aggregation).
- Ensured that cyber playbooks were utilized for the most common/prevalent attacks.
- Acted as initial triage and initial investigations of security events within SIEM.
- Reported any SIEM gaps in coverage or failure, degradation, or anomalies within the SIEM Platform.
- Worked side by side with vendors, professional services, and security engineers in maintaining, updating, or health-checking the SIEM, related technologies, and its data sources as well as actively looked for blind spots or gaps in event monitoring coverage.
- Conducted threat hunts and reported within the network for a specific number of hours per week, looking for anomalies, misconfigurations, or suspicious network activity utilizing the telemetry data available in SIEM.
Experience
5-7 Years
Level
Senior
Education
BSc CS
Security Operations Center Analyst Resume
Objective : As a Security Operations Center Analyst, Led the development, communication, and continuous improvement of the cyber incident response plan.
Skills : Security Information, Event Management
Description :
- Developed and maintained incident response playbooks for common threat and incident types, ensuring that colleagues are formally kept aware of any changes.
- Supported the transition of a SOC with expert security guidance and application of best practices.
- Defined and continuously developed a use case-driven logging, monitoring, and response capability to ensure responsiveness and resilience to cyber security threats.
- Defined the cybersecurity operations strategy in coordination with senior business and external stakeholders.
- Demonstrated experience working with SIEM technology and SIEM engineering (including tool configuration) within an enterprise SOC.
- Identified and planned for the required levels of cyber investment within the CSOC to include governance, tooling, and staffing.
- Performed triage of security events, determined scope, priority, and impact, and made recommendations that enabled expeditious remediation.
Experience
2-5 Years
Level
Executive
Education
BCS
Assistant SOC Analyst Resume
Objective : As an Assistant SOC Analyst, Reports to the Digital Forensic and Incident Response Manager concerning security events, incident trends, residual risk, vulnerabilities, and other security exposures, including misuse of information assets and noncompliance.
Skills : Intrusion Detection Systems, Intrusion Prevention Systems
Description :
- Assisted with control improvements to identify control weaknesses and contributed to vulnerability advisories.
- Participated in security investigations and compliance reviews, as requested by internal or external auditors.
- Assisted with audit finding remediation, action plans and tracked progress and provided status updates to the enterprise compliance team for reporting purposes.
- Maintained awareness of applicable regulatory standards, upstream risks, and industry leading security practices.
- Provided feedback and recommendations on existing and new security tools and techniques for the improvement of analysis, incident investigation and security controls.
- Provided regular reports to management on the state of the organization's security.
- Stayed abreast of the latest security threats and trends.
Experience
0-2 Years
Level
Junior
Education
IT Bachelor's Degree
Associate SOC Analyst Resume
Objective : As an Associate SOC Analyst, Monitor both customer and internal infrastructure to detect security events and vulnerabilities by using various security tools, SIEM technologies, and other security resources.
Skills : Malware Analysis, Incident Response
Description :
- Monitored security systems and networks for suspicious activity.
- Investigated security incidents and determined their severity.
- Contributed to incident response, maintaining relevant communication and information in emails, ticket summaries, analysis, and reporting.
- Escalated security incidents to the next level for further investigation.
- Made recommendations for ongoing tuning and updates to the SIEM system.
- Participated in security audits and compliance reviews.
- Validated alerts triggered by security information and event management (SIEM) tools.
Experience
0-2 Years
Level
Junior
Education
Bachelor's in Cybersecurity
Junior SOC Analyst Resume
Objective : As a Junior SOC Analyst, supports CBTS and its security strategy and objectives by providing security monitoring and remediation and provides services to mitigate cyber risks to CBTS and protects company information, systems, products, facilities, and assets.
Skills : Threat Intelligence, Forensic Analysis
Description :
- Monitored security alerts and events and followed playbooks to respond to and escalate security incidents.
- Communicated with employees to remediate discovered risks.
- Supported Security applications and infrastructure.
- Reviewed systems and applications and assisted with vulnerability scans.
- Performed maintenance activities for applications and infrastructure.
- Assisted with documentation and policy creation.
- Identified and facilitated remediation of potential security risks.
Experience
2-5 Years
Level
Junior
Education
Bachelor's in Cybersecurity
SOC Analyst Resume
Summary : As a SOC Analyst, Monitor, triage, and investigate security incidents on critical client infrastructure and Conduct a thorough examination of system events, logs, and network traffic to spot any security flaws.
Skills : Communication, Problem-Solving
Description :
- Explored LogRhythm, Splunk, Darktrace (Threat Visualizer), and FireEye (EX, NX, HX, CMS).
- Navigated the OSI Reference Model and danced with network communication protocols.
- Investigated Windows/Linux systems, uncovering signs of compromise with a digital magnifying glass.
- Articulated cybersecurity risks in a language that resonated with business outcomes.
- Managed security incidents like a strategic virtuoso, offering user-centric updates.
- Employed Defensive Cyber-attack methodologies and frameworks.
- Tackled challenges head-on with the latest in security technology.
Experience
7-10 Years
Level
Management
Education
Bachelor's in Cybersecurity
SOC Analyst Resume
Headline : As a SOC Analyst, Stay up-to-date with the latest cyber security threats, trends, and best practices through continuous learning and professional development.
Skills : Security Monitoring, Vulnerability Management
Description :
- Analyzed and investigated various security events to validate security incidents.
- Performed proactive and reactive security incident handling and escalation where appropriate.
- Reviewed vulnerability assessments and provided findings with remediation actions.
- Managed, tuned, and optimized security tools following best practices and other performance metrics.
- Responded to customers’ tickets and emails and assisted with security-related issues efficiently and effectively.
- Collaborated with senior SOC analysts and other cyber security stakeholders to mitigate and remediate security threats.
- Contributed to the development and improvement of SOC processes, procedures, and workflows.
Experience
5-7 Years
Level
Executive
Education
Bachelor's in Cybersecurity
SOC Analyst Resume
Objective : As a SOC Analyst, knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise Anti-Virus products.
Skills : Log Analysis, Risk Assessment
Description :
- Facilitated containment, eradication, and recovery efforts by offering support for incident response.
- Helped the team stay up to date on security operations, triage, and SOC tool expertise.
- Responsible for preparing in-depth reports tailored for both technical and non-technical audiences of our managed customers.
- Used threat-informed defense and Mitre ATT&CK to analyze and improve detection rules and use cases.
- Kept up to date and maintained documentation of security incidents, such as incident reports, analytical results, and mitigating techniques.
- Participated in threat intelligence operations.
- Ability to obtain and maintain SC-level Security Clearance.
Experience
0-2 Years
Level
Entry Level
Education
Bachelor's in Cybersecurity
SOC Analyst Resume
Headline : As a SOC Analyst, Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.
Skills : Compliance, Communication Skills
Description :
- Utilized sensor telemetry data and correlated logs to establish the context of an alert and rule out false positives.
- Documented tuning and detection opportunities, turning them into operational alerting.
- Mitigated and contained identified threats using approved incident response methodologies.
- Provided subject matter expertise as an escalation point for security incidents to ensure proper assessment, containment and mitigation is taken.
- Collaborated with operational support teams to ensure they are actively engaged in addressing security threats and impact to the business.
- Contributed to high-severity incident response efforts which involved multiple teams to reach prompt containment, primarily aiding in incident analysis and reporting.
- Provided peer support to improve the technical capabilities of fellow SOC Analysts.
Experience
5-7 Years
Level
Consultant
Education
Bachelor's in Cybersecurity
SOC Analyst Resume
Objective : As a SOC Analyst, Perform analysis of security alerts to evaluate true positive malicious risks to the business, determine containment action, and identify required preventative measures, documenting your findings throughout within the Incident Management System.
Skills : Teamwork, Continuous Learning
Description :
- Identified trends, potential new technologies, and emerging threats that may impact the business.
- Operationalized actionable Threat Intelligence reports from internal and external sources.
- Performed threat hunting using defined procedures and alert trend analysis to find inconspicuous threats.
- Assisted with the security monitoring enrollment process to ensure adequate coverage and effectiveness of all new and existing cloud and on-premise-based applications, services, and platforms.
- Facilitated the development and tuning of detection use cases to support enrollments and ensure high-fidelity alerting in SIEM and other related Detection technologies.
- Worked in collaboration with teams within Cybersecurity to identify detection and response gaps to improve.
- Developed and reviewed Incident Response Playbooks, SOPs, and Alert Runbooks, to streamline the incident response efforts.
Experience
0-2 Years
Level
Fresher
Education
Bachelor's in Cybersecurity