Job Description
At Verint, we believe customer engagement is the core of every global brand. Our mission is to help organizations elevate Customer Experience (CX) and increase workforce productivity by delivering CX Automation. We hire innovators with passion, creativity, and drive to answer constantly shifting market challenges and deliver impactful results for our customers. Our commitment to attracting and retaining a talented, diverse, and engaged team creates a collaborative environment that openly celebrates all cultures and affords personal and professional growth opportunities. Learn more at www.verint.com .
Overview of Job Function:
As a SOC Analyst, provide first-line support in a 24 x 7 Ops Center for incidents and technical issues, This role is an internal triage analyst who assesses inbound security data and communications to assess threats and analyse triggered security events. This role is responsible to take part in the Global SOC Infrastructure support which includes overall ticketing & event management of all Verint security applications. This includes deep analytical review of triggered SOC events, and will assist and aid in the building of various SOW, SOP's, and KPI's.
Responsibilities
Principal Duties and Essential Responsibilities:
- Candidates must be open to working a rotating 24/7 shift schedule which includes night shift work and weekends.
- Rapidly respond to all triggered security events along with assisting in escalated incidents.
- Deep analytical review of triggered events and able to provide a detailed report of T1-T2 incidents.
- Understand IT infrastructure and networking to be able to quickly dispatch security events.
- Leverage SOC best practices and process frameworks to drive continual improvement.
- Strong communications skills and easily interact with a variety of different people and personalities. Success in this role depends on the effective dispatch of both security and communication triage events in a timely manner.
- Help create and amend playbooks and processes to streamline SOC performance and efficiency.
- Continuously drive to learn new aspects of the security business and help push new technologies and security posture.
- Able to engage a security incident response plan (preparation, identification, containment, eradication, recovery, lessons learned).
- Help create documentation and implement new policies and procedures.
- Learn and help coach new security models and have a desire to push security awareness, processes, and knowledge.
Qualifications
Minimum Requirements:
- 1-4 years of progressive information security experience.
- Bachelors degree (information technology or cyber security related field of study).
- Expertise in Splunk, Cisco Security suite, AD, Service Now, Azure
- Knowledge of security basics, malware, firewalls IDS/IPS, Windows, AD, Network, and security auditing.
- Good communication skills.
Desired Skills
- SANS certification (GCIA, GMON, GCED, GSEC).
- Security +.
- Demonstrate MITRE ATT&CK framework.