We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
Remote

SOC Analyst

MorganFranklin Consulting LLC
United States
Nov 13, 2024

Why Work Here?

MorganFranklin Consulting is a management advisory firm that works with leading businesses and government to address complex and transformational finance, technology, cybersecurity, and business objectives.

MorganFranklin's cybersecurity practice helps clients across the globe to solve their most critical cybersecurity needs. From consulting and implementation to managed services and project resourcing, we work to safeguard assets by identifying risks, developing, and maturing cybersecurity programs, and implementing solutions that support and meet business goals.

Custom tailored and business-aligned service offerings include:



  • Strategy and GRC
  • Cybersecurity Operations
  • Identity & Access Management
  • Incident Response & Risk Intelligence
  • Application Security
  • Managed Security Services Provider


This is a Vaco employment opportunity aligned to MorganFranklin's cybersecurity offering (Vaco LLC, dba "MorganFranklin Cyber").

Learn what it means to truly own your career and be a part of a growing organization with a big, bold future.

SOC Analyst

We are seeking a Security Operations Center Analyst to be an integral part of our Cyber FusionCenter, providing 24/7 Advanced Threat Detection and Response for our customers.

You Will



  • Provide initial triage process, conducting in-depth analysis of security-related incidents using datafrom various sources, and communicating findings in a clear, digestible manner for both technicaland non-technical stakeholders.
  • Support key stakeholders throughout the incident response process, providing detailed analysisfrom initial detection to root cause identification.
  • Identify alert trends and collaborate with key stakeholders to enhance our Advanced Detectionand Response Capabilities.


Qualifications



  • Bachelor's degree in Cybersecurity or a related field, or equivalent experience in internal securityoperations or MSSP environments.
  • 1+ years of experience responding to security-related incidents.
  • Certifications such as Security+, CySA+, GCIA, or other relevant cybersecurity credentials.
  • Experience with Splunk, Azure Sentinel, CrowdStrike, Defender, and other SIEM/EDR platforms.
  • Understanding of the initial triage process and incident reporting.
  • Knowledge of threat actor tactics and attack life cycles.
  • Technical writing and reporting skills.
  • Experience in creating and updating runbooks and workflow documentation.
  • Demonstrated communication and collaboration abilities, working effectively with both internalteams and external partners.
  • Active participation in the cybersecurity community, such as contributing to blogs or attendingannual conferences.

Applied = 0

(web-5584d87848-99x5x)