Immediate Hiring: 3rd Shift Cyber Security Operations Analyst
Invest in your future with this career-defining role as a 3rd Shift Cyber Security Operations Analyst! We have an opening at our office in Remote. This position requires a strong and diverse skillset in relevant areas to drive success. An attractive remuneration of a competitive salary is on offer for the successful candidate.
Â
Â
The 3rd Shift Cyber Security Operations Analyst monitors and protects the organizationÂs systems, networks, and data during overnight hours. This role involves real-time threat detection, incident response, and maintaining the overall security posture of the organization. The analyst works as part of a Security Operations Center (SOC) team and plays a critical role in identifying and mitigating security risks during non-business hours. Key Responsibilities: Threat Monitoring and Detection: Â Continuously monitor security tools, such as SIEM systems, intrusion detection/prevention systems (IDPS), firewalls, and endpoint protection platforms, to detect potential security threats or anomalies. Â Analyze and investigate security alerts, identifying true threats versus false positives. Â Conduct proactive threat hunting to identify vulnerabilities or malicious activities. Â Monitor and analyze network traffic, system logs, and user activity to ensure compliance with security policies. Incident Response and Management: Â Respond to security incidents, including malware infections, phishing attempts, unauthorized access, and other potential breaches. Â Execute containment, eradication, and recovery procedures to minimize the impact of incidents. Â Collaborate with senior analysts or SOC managers to escalate complex or high-risk incidents. Â Document all incidents in detailed reports, including root cause analysis and lessons learned. System Maintenance and Updates: Â Perform regular updates and maintenance on security tools and platforms to ensure they function effectively. Â Assist in applying patches and updates to address known vulnerabilities. Â Support the integration of new security technologies or tools into the existing infrastructure. Collaboration and Communication: Â Communicate effectively with team members and stakeholders to provide updates on incidents and overnight activities. Â Participate in shift handovers to ensure continuity of security operations across shifts. Â Assist in the development of documentation, playbooks, and standard operating procedures (SOPs) for SOC operations. Compliance and Reporting: Â Ensure security operations align with organizational policies, regulatory requirements, and industry standards (e.g., ISO 27001, NIST, GDPR). Â Prepare and submit daily reports summarizing overnight security events and activities. Â Contribute to security audits and compliance reviews. Continuous Improvement: Â Stay updated on emerging cyber threats, vulnerabilities, and industry best practices. Â Provide recommendations to improve detection, response, and prevention capabilities. Â Participate in training, simulations, and drills to enhance incident response readiness. Qualifications: Education: Â BachelorÂs degree in Cybersecurity, Information Technology, Computer Science, or a related field. Â Equivalent work experience may be considered. Experience: Â 1-3 years of experience in cybersecurity, SOC operations, or a related IT field. Â Familiarity with SIEM tools, IDPS, firewalls, and endpoint detection platforms. Â Experience working in a 24/7 operational environment is a plus. Skills and Competencies: Â Knowledge of cybersecurity principles, threat landscapes, and attack vectors. Â Strong analytical and problem-solving skills for investigating security events. Â Proficiency in using security tools and platforms (e.g., Splunk, QRadar, Sentinel). Â Understanding of networking concepts (TCP/IP, DNS, VPNs) and operating systems (Windows, Linux). Â Ability to work independently during overnight hours and make quick, informed decisions. Certifications (preferred): Â CompTIA Security+, CySA+, or equivalent certifications. Â GIAC Certified Incident Handler (GCIH). Â Certified Ethical Hacker (CEH). Â Splunk Core Certified User or similar tool-specific certifications. Apply Job!Â
Join Our Team!
This is a fantastic opportunity to grow your career. If you have the skills and passion we're looking for, please submit your application today.
apply to this job