Logo of Huzzle

Find 128,000+ jobs, internships & events from 7,000+ top companies on Huzzle using AI

Junior SOC Analyst - Overnight Shift

image

Capgemini

21d ago

  • Job
    Full-time
    Junior Level
  • Software Engineering
    IT & Cybersecurity

AI generated summary

  • You must work overnight shifts, be a US citizen or Green Card holder, and have a relevant degree or experience. You need 1+ years in security, knowledge of security methods, SIEM tools, and scripting skills.
  • You will monitor security alerts, analyze threats, validate incidents, troubleshoot issues, and share insights, while maintaining awareness of cyber trends in a 24x7 SOC environment.

Requirements

  • Must be willing to work overnight shift (1am-9am EST)
  • US Citizen or Green Card required
  • Strong verbal and written communication skills, fluent in English.
  • Bachelor’s degree from an accredited institution in Computer Science, Information Technology or a related discipline, or equivalent experience/combined education, with some relevant working experience and specialized training that is commensurate with the assignment.
  • 1+ years' experience as a Security/Network Administrator or equivalent knowledge. Previous Security Operations Center (SOC) experience would be a plus.
  • Knowledge of various security methodologies and processes, and technical security solutions (firewall, proxy, intrusion detection systems).
  • Solid Understanding of TCP/IP, the OSI Model, and underlying Protocols.
  • Experience with Security Information and Event Management (SIEM) tools. Splunk and Arcsight experience would be a plus.
  • Splunk searching and/or regular expression creation experience to support dynamic security event analysis.
  • Scripting language skills in Python or PowerShell are preferred

Responsibilities

  • Responsible for working in a 24x7 Security Operation Center (SOC) environment.
  • Maintain situational awareness of emerging cyber trends by reviewing open-source reports for recent vulnerabilities, malware, and other threats that have the potential to impact the organization. Document threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
  • Ability to understand and correlate data from multiple sources, not limited to user authentication events, windows security event logs, syslog, NetFlow data, DHCP logs, DNS logs, intrusion detections alerts, proxy logs, packet captures, and firewall events.
  • Triage and validate security alerts and escalate incidents, as required.
  • Troubleshoot system misconfigurations and recommend best practices for remediation.
  • Take initiative in evaluating, proposing, and deploying various detection capabilities.
  • Integrate and share information with other analysts and other teams.
  • Deliver status reports, briefings, recommendations, and findings to management as required.

FAQs

What are the working hours for the Junior SOC Analyst position?

The working hours for this position are overnight from 1am to 9am EST.

Is this position open to non-U.S. citizens?

No, candidates must be U.S. Citizens or Green Card holders.

What qualifications are required for the Junior SOC Analyst role?

A Bachelor's degree in Computer Science, Information Technology, or a related discipline, or equivalent experience, along with 1+ years of relevant experience, is required.

Is previous experience in a Security Operations Center (SOC) important?

While previous SOC experience is a plus, it is not strictly necessary. Relevant experience as a Security/Network Administrator is acceptable.

Are there any specific technical skills required for this position?

Yes, candidates should have knowledge of security methodologies, TCP/IP, the OSI Model, experience with Security Information and Event Management (SIEM) tools, and scripting skills in Python or PowerShell are preferred.

Will training be provided for the Junior SOC Analyst role?

The position typically requires some relevant working experience, but specialized training may be provided depending on the candidate's needs.

What is the company culture at Capgemini?

Capgemini fosters a diverse and responsible working environment, emphasizing collaborative teamwork to drive business transformation through technology.

Are there opportunities for advancement within the role?

Yes, Capgemini promotes employee growth and development, offering opportunities for advancement within the organization.

Is experience with specific SIEM tools required?

While experience with SIEM tools is required, familiarity with Splunk and Arcsight is considered a plus.

Will there be a background check for this position?

Yes, a background check is typically conducted as part of the hiring process at Capgemini.

Get the Future You Want

Technology
Industry
10,001+
Employees
1967
Founded Year

Mission & Purpose

Capgemini is a global leader in partnering with companies to transform and manage their business by harnessing the power of technology. The Group is guided everyday by its purpose of unleashing human energy through technology for an inclusive and sustainable future. It is a responsible and diverse organization of 360,000 team members in more than 50 countries. With its strong 55-year heritage and deep industry expertise, Capgemini is trusted by its clients to address the entire breadth of their business needs, from strategy and design to operations, fueled by the fast evolving and innovative world of cloud, data, AI, connectivity, software, digital engineering and platforms. The Group reported in 2022 global revenues of €22 billion.