COMPANY OVERVIEW
Pratum is a cybersecurity consulting and managed security services firm. We help solve information security challenges based on risk, not fear. We are growing and are looking for talented individuals to join our team.
 
Help us get to know you by submitting your resume and cover letter with your application.
 
 
GENERAL DESCRIPTION
A SOC Analyst I at Pratum is an entry-level position that provides real time security monitoring and threat hunting in our Security Operations Center (SOC). You will have the opportunity to work with customers across many industries by providing managed security services such as SIEM, vulnerability scanning, firewall and end point management. In this position, you will provide exceptional customer service by assisting customers in identifying potential security incidents, attack sources, root causes and/or threat actors.  This position will also configure and maintain security hardware and software in accordance with organizational standards.  
 
If you have a solid background in IT, have a passion for cybersecurity, a desire for continuous learning and analytical thinking, but lack formal SIEM tool training or experience, we’d still love to talk with you.
 
 
Tasks:
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. 
  • Coordinate with customer staff to validate network alerts. 
  • Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. 
  • Perform event correlation using information gathered from a variety of sources to gain situational awareness and determine the effectiveness of an observed attack. 
  • Receive and analyze network alerts from various sources and determine possible causes of such alerts. 
  • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. 
  • Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity. 
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. 
  • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). 
  • Isolate and remove malware. 
  • Identify network mapping and operating system (OS) fingerprinting activities. 
  • Notify customer of suspected cyber incidents and articulate the event's history, status, and potential impact for further action. 
  • Work with customers to resolve computer security incidents and vulnerability compliance. 
 
Experience/Education Preferences:
AAS or Bachelor’s Degree or equivalent work experience. 
Professional Certifications (I.e. GIAC, CCNA, MCSE) preferred.
Experience with AWS, FortiSIEM, FortiGate, Office365, Azure and similar security technologies is preferred.

Equal Opportunity Employer, including disabled and veterans.