Job Description :

We have an urgent requirement of Security Operations Center (SOC) Support Analyst with our direct client in Weehawken, NJ for a long term contract project.

* Please share your updated resume in MS Word format along with contact details at

Job Title: Security Operations Center (SOC) Support Analyst
Job Location: Weehawken, NJ
Duration: 6 Months +

Job Description:
Level 2 Support Analyst
The second level SOC support analyst has extensive experience in incident response, malware analysis, and intrusion detection; offering a matured level of knowledge and experience over that of the first level SOC analyst; incidents that cannot be resolved by the 1st level analyst are escalated to the 2nd level.

Incident Handling – encompassing multiple functions:
Detecting and reporting – the ability to receive and review event information, incident reports, and alerts
Triage – the actions taken to categorize, prioritize, and assign events and incidents
Analysis – the attempt to determine what has happened, what impact, threat, or damage has resulted, and what recovery or mitigation steps should be followed.
Incident response – the actions taken to resolve or mitigate an incident, coordinate and disseminate information, and implement follow-up strategies to prevent the incident from happening again
Analyze malware samples to understands its characteristics and define signatures or indicators of compromise for detecting malware presence.
Enhance and tune the SIEM and NIDS rules to identify security incidents and reduce false positives.
Act upon threat intelligence provided by CTI function
Investigate indicators of compromise (IOCs) provided by CTI or the hunter function.
Respond to Information Security related queries.
Maintain and update all relevant documentation (procedures, tickets, etc.

Structured Approach:
The 2nd level SOC analyst adheres to a structure approach; following clear processes and workflows to formally analysis and respond to address security events.
Core Skills and Requirements
Background in networking or security
Ability to communicate security-related concepts to a broad-range of technical and non-technical staff
Collaboration skills and organizational skills,
Communications (verbal and written) and interpersonal skills
Uphold UBS principles and governing policies
Experience in incident response; possessing the ability to identify, scope, and investigate sophisticated attacks (e.g. APT
Experience in malware analysis.
Experience in developing SIEM and NIDS rules.
Expert knowledge of Information Security best practices.
Advanced understanding of operating systems (UNIX/Linux and Windows
Advanced understanding of TCP/IP protocols.
Ability to think critically and properly assess security events.
Knowledge of incident and problem management frameworks (e.g. NIST, ITIL)
Knowledge of scripting (Perl or similar
Familiar with security processes in a large organization, including the definition and follow-up of standard operational procedures, incident and problem management, and change requests.