CSOC Security Analyst
SKILLS
FULL DESCRIPTION
Summary
Chorus is seeking enthusiastic CSOC Security Analysts for their Cyber Security Operations Centre. The role involves monitoring security technology, threat hunting, creating and improving playbooks, investigating security alerts, and working with colleagues to mitigate issues. Candidates should have a can-do attitude and a willingness to learn and grow. This is a 24/7/365 role.
- Ability to work SecOps 24/7/365 shifts.
- Responsible for monitoring our technology stack, EDR, XDR, CASB, CSPM, SIEM, SOAR.
- When no alerts are being generated, we expect threat hunting to be performed.
- Ability to create playbooks or runbooks.
- Ability to improve playbooks or runbooks.
- Experience in creating and documenting processes and procedures.
- To perform investigations in response to Security Alerts, which could be from any of our security technology stacks.
- Be proactive and make use of available toolsets to look for compromises within our customers' environments.
- Work with your colleagues to mitigate and remediate any potential issues.
- To prepare security incidents that can be escalated to our customers.
- To work with our other internal teams within Chorus and be a SME on security.
- Create technical documentation in use cases or playbooks to assist colleagues in RCA.
- Utilise tools available e.g., vulnerability management and threat intelligence to provide contextual information to incidents.
- Stay up to date with the threat landscape.
- Responsible for design of security alerts and incidents.
Please feel free to submit your covering letter via video if you prefer.
The Role
Chorus require passionate individuals for our Cyber Security Operations Centre. We are searching for enthusiastic Cyber Security Analysts. We are looking for individuals looking to take their first step into a Cyber Security Operations Centre. Are you interested in threat detection and response? Are you interested in using leading technology to assist and help with our customers' security posture? This role is for a 24 x 7 x 365 Cyber Security Operations Centre and will require working shifts.
Key Responsibilities
The core responsibilities for this role are:
- Ability to work SecOps 24/7/365 shifts.
- Responsible for monitoring our technology stack, EDR, XDR, CASB, CSPM, SIEM, SOAR.
- When no alerts are being generated, we expect threat hunting to be performed.
- Ability to create playbooks or runbooks.
- Ability to improve playbooks or runbooks.
- Experience in creating and documenting processes and procedures.
- To perform investigations in response to Security Alerts, which could be from any of our security technology stacks.
- Be proactive and make use of available toolsets to look for compromises within our customers' environments.
- Work with your colleagues to mitigate and remediate any potential issues.
- To prepare security incidents that can be escalated to our customers.
- To work with our other internal teams within Chorus and be a SME on security.
- Create technical documentation in use cases or playbooks to assist colleagues in RCA.
- Utilise tools available e.g., vulnerability management and threat intelligence to provide contextual information to incidents.
- Stay up to date with the threat landscape.
- Responsible for design of security alerts and incidents.
Personal Specification
It would be desirable, but not essential, to have any of these qualifications. • Comptia CySA+, SEC +, CCNA, Network+ • Degree in a Computer Science discipline OR equivalent work experience. • Experience in understanding the MITRE ATT&CK framework or any other security defence framework. • Experience in Microsoft Azure or any other Cloud based technology
If you do not have any of the above, please do not worry. What we want is a can-do attitude, an enthusiastic individual, someone who can break down barriers and wants to learn and grow.