This job might no longer be available.
SOC Analyst
1 year ago
Overview
ZeniMax Central Services is looking for an experienced SOC Analyst for our global support team in a 24/7/365 environment. Candidates will have a high sense of urgency and knack for investigation! You will have the opportunity to work with internal teams, third parties, and leadership to ensure security incidents are investigated and compliance requirements are met. - so great communication skills are a must!
Responsibilities
- The SOC Analyst will join the Security Operations Team on 3rd (overnight) shift that is focused on protecting the organization and player environments
- The primary function of this position is to prepare reports of analysis to provide briefings to management and clients
- Participate with investigations, identification and reporting on cyber threats
- Provide technical guidance to Security Operations Center Analysts and leadership
- Respond to cyber security escalations and provide analysis and trending of security log data from security network and live gaming environments.
- Monitor and analyze Security Information and Event Management (SIEM) alerts to identify security issues for remediation and investigate events and incidents
- Monitor threat intelligence feeds
- Provide proactive “threat hunting” to detect incidents
- Perform the duties and responsibilities of Incident Response Coordinator when needed
- Investigate, document, and report on information security issues and emerging trends
Qualifications
- Minimum BS degree in Computer Science or related technical experience
- Experience authoring reports for leadership teams
- Effective verbal and technical writing skills
- Familiarity with security tools (Vulnerability Management, SIEM, Endpoint Security, Web proxies, etc.)
- Experience using cloud computing technologies including AWS and/or Azure
- Knowledge of TCP/IP networking: networking topology, protocols, and services
- Experience monitoring threat feed sources
- Knowledge of SOC tools like VirusTotal, various Sandboxes, various Malware Analysis tools
Preferred Skills
- Experience coordinating incident response efforts, assisting with classifying security events, developing remediation guidance, support documentation and reporting deliverables
- Experience conducting risk assessments, developing appropriate risk responses and monitoring the environment for threats
- 1 year of Security Operations Center experience and/or equivalent
- Deep understanding of Splunk Enterprise Security
- Advanced Knowledge of Microsoft and Linux operating systems
- Deep understanding of Incident Response coordination processes
- Experience analyzing security logs from SIEM, Firewalls, Vulnerability Scanners
Applicant Privacy Notice
ZeniMax Media California Applicant Privacy Notice
E-Verification Notice
E-Verify_Participation_Poster
IER_Right_to_Work_Poster
Create Your Profile — Game companies can contact you with their relevant job openings.