SR SECURITY OPERATIONS CENTER ANALYST
20 days ago
Austin
Job DescriptionSalary: $113,000 - $125,000 SR SECURITY OPERATIONS CENTER ANALYST Position Description JOB TYPE: Full-time WORK LOCATION: Onsite in Martinsburg, WV, Hines IL or Austin, TX. Only Candidates who reside in WV, IL and TX will be considered for this position. POSITIONS: There are 2 positions are available: • 1st shift: Sunday -Thursday, 0700 - 1530,, • 2nd shift: Tuesday - Saturday, 0700-1530 ABOUT: QMS Consulting (QMS) is an Education Technology (EdTech) and Information Technology (IT) Consulting firm specializing in Cybersecurity / Data Protection, Cloud Lifecycle, Software Development and Data Science. QMS seeks a seasoned Security Operations Center (SOC) analyst to work within a dynamic and highly innovative SOC team that supports federal government customers. The Senior SOC analyst will include onboarding new detection technologies, crafting and updating incident response playbooks, and leading investigations of escalated incidents by analyzing attack patterns and determining root causes. In this role, you should be technically sound, detail oriented with the ability to lead tasks and ensure high-quality service delivery. Critical thinking and problem-solving skills are essential for this position. JOB RESPONSIBILITIES: Sr. Security Operations Center Analyst responsibilities include: • Work with detection engineering team to onboard and operationalize new cloud detection tools include Azure Sentinel, AWS Guard Duty, Netskope CASB etc., • Develop playbooks for cloud incident response., • Lead and actively participate in the investigation, analysis, and resolution of Tier 3 and escalated cybersecurity incidents. Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrences., • Serve as a cloud subject matter expert in handling incidents of varying complexity, providing guidance and support to Tier 1 and Tier 2 analysts during investigations., • Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks., • Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholders., • Develop and operationalize advanced security analytics use cases to detect and respond to sophisticated cyber threats in real-time., • Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy., • Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions., • Support the mentoring and training of more junior IR staff., • Stay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilities. This list of responsibilities may not be all-inclusive and can be expanded to include other duties or responsibilities as required by the business. QUALIFICATIONS AND REQUIRED EXPERIENCE: Sr. Security Operations Center Analyst requirements include: • 5+ years of experience supporting large-scale IT related projects, • 3+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC) that includes monitoring of cloud environments., • A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment., • Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring tools, • Experience with enterprise ticketing systems like ServiceNow, • Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight., • Ability to learn and function in multiple capacities and learn quickly. Strong verbal and written communication skills, • Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience), • Certifications, such as CISSP, GCIH, GCFA, CEH, or equivalent, are highly desirable SALARY: $113,000 - $125,000 BENEFITS: health benefits, holidays and PTO We are an equal opportunity employer. Our policy is to always provide equal opportunity without regard to race, color, religion, sex, pregnancy, national origin, ancestry, age, marital status, sexual orientation, family responsibility, physical or mental disability, medication, or status as a veteran.