The Role: 11:11 Systems is looking for an experienced Security Analyst to join our Security Operations Center. This individual will assist in the analysis, triage, and response to security events for our customers. The ideal candidate will be energetic, adaptable, detail oriented, and have experience with network and security incident analysis and triage across a variety of supporting systems such as SIEM, EDR, CRS and SOAR. This is a full-time, fully remote, position that will be reporting to the Security Operations Center Manager.
What You'll Do: - Investigate, triage, escalate and document security alerts in accordance with protocols and established SLOs/SLAs using a variety of tools used in our Security Operations Center such as SIEM, EDR, CRS and SOAR.
- Determine tactics, techniques, and procedures (TTPs) for intrusion sets and align with MITRE ATT&CK and/or other frameworks.
- Work with our customers on communicating security events relevant to their network infrastructure and record all interactions and pertinent information in internal ticketing platforms.
- Document and communicate feedback or service improvement suggestions by customers to the appropriate internal teams.
- Identify and suggest possible improvements to SOC operational procedures and analysis methodologies.
- Handle service support requests for active directory accounts, two factor authentication, SSL VPN and other customer facing systems.
- Share responsibility for maintaining documentation on all incidents and job-related procedures.
- Participate regularly in Security Operations Center working groups and collaborate across departmental lines to ensure the security of customer environments.
- Remain current on trends/technologies in the information security industry and develop depth in your desired cyber discipline and/or technologies.
- Assist with training other analysts by conducting training, documenting findings in internal knowledgebase, relating improvements and sharing information.
- Other duties as assigned.
Who You Are & What You'll Bring: - 2+ years of experience in IT,
- 1+ years of security operations, threat hunting, or a related field with proven experience in incident response triage and investigation.
- Demonstrated knowledge of various security methodologies/processes and technical security solutions (firewall and network/security devices).
- Demonstrated knowledge of TCP/IP Protocols, network analysis, and network/security applications.
- Strong understanding of network security concepts, operating systems, and malware analysis techniques.
- CySA+ or CFR and GCIH certification preferred or obtained within 6 months.
- Information technology experience in areas not particular to security such as help desk, systems administration, end user support, etc.
- Strong understanding and experience with Security systems and tools such as SIEM, EDR, CRS and SOAR platforms.
- Demonstrated motivation to expand skillset through participation in security training.
- Ability to multi-task, prioritize, and manage time effectively.
- Excellent verbal and written communication skills with strong attention to detail.
- Excellent customer service skills.
- Must be a US Citizen.
- Must be legally eligible to work in [US] without visa sponsorship.
- Must be able to remain physically located in the continental United States during your period of employment.
To perform this job successfully, an individual must be able to perform each essential function satisfactorily. The requirements listed above are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable qualified individuals with disabilities to perform the essential functions.
Benefits: - 401k Plan with Company Match
- Healthcare, vision and dental Insurance Plan
- Life Insurance
- Short-Term Disability Insurance
- Long-Term Disability Insurance
- Paid Vacation & Holidays
- Leaves - primary care and new parent leave, maternity leave
- Wellness Program