COMPANY OVERVIEW
Pratum is a cybersecurity consulting and managed security services firm. We help solve information security challenges based on risk, not fear. We are growing and are looking for talented individuals to join our team.
 
Help us get to know you by submitting your resume and cover letter with your application.
 
 
GENERAL DESCRIPTION
A SOC Analyst II at Pratum provides real time security monitoring and threat hunting in our Security Operations Center (SOC).  You will have the opportunity to work with customers across many industries by providing managed security services such as SIEM, vulnerability scanning, firewall and end point management.  In this position, you will provide exceptional customer service by assisting customers in identifying potential security incidents, attack sources, root causes and/or threat actors.  
 
This position will configure and maintain security hardware and software in accordance with organizational standards.  As a senior member of the SOC team, you will also be responsible for managing the backend infrastructure for the SOC environment.
 
 
Tasks:
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
  • Coordinate with customer staff to validate network alerts.
  • Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
  • Perform event correlation using information gathered from a variety of sources to gain situational awareness and determine the effectiveness of an observed attack.
  • Receive and analyze network alerts from various sources and determine possible causes of such alerts.
  • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
  • Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
  • Examine network topologies to understand data flows through the network.
  • Recommend computing environment vulnerability corrections.
  • Identify and analyze anomalies in network traffic using metadata.
  • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
  • Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.
  • Isolate and remove malware.
  • Identify applications and operating systems of a network device based on network traffic.
  • Reconstruct a malicious attack or activity based off network traffic.
  • Identify network mapping and operating system (OS) fingerprinting activities.
  • Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
  • Notify customer of suspected cyber incidents and articulate the event's history, status, and potential impact for further action.
  • Assess adequate access controls based on principles of least privilege and need-to-know.
  • Work with customers to resolve computer security incidents and vulnerability compliance.
 
Experience/Education Preferences:
AAS or Bachelor’s Degree or equivalent work experience. 
Professional Certifications (I.e. GIAC, CCNA, MCSE) preferred.
Experience with AWS, FortiSIEM, FortiGate, Office365, Azure and similar security technologies is preferred.

Equal Opportunity Employer, including disabled and veterans.