Job Description Job Purpose: Part of the Logicalis Managed Security team, the Security Senior Analyst role is responsible for managing services for Managed Security Service customers. The Security Specialist has the remit of assessing, discovering and directing remediation of security threats & vulnerabilities within client environments whilst working as part of a managed security team on various cyber security projectsand tasks. This role involves working at all levels with Solution Architects, Development Operations, Engineers, SOC Analysts, clients and other stakeholders in building and managing security architecture and systems which are kept up-to-date and relevant in the rapidly evolving Managed Security Services industry. This is a senior technical role and the role holder is expected to provide 3rd and 4th line support for the current service platforms and services as well as supporting, mentoring and coaching colleagues. In addition, there will be a requirement to liaise with channel partners and vendors.. Key Accountabilities:Handle internal and client escalations by engaging with key stakeholdersFollow & oversee that the team follows published SOC policies and proceduresBe a subject matter expert across Managed Security Service and be able to clearly articulate deliverables, limitations, feasibility, etc.Thorough experience of the configuration, tuning and maintenance of SOC tools to improve detection capability and building re-usable visualisations / dashboards for security alert triage, threat hunting and similar use cases, etc.Develop Standard Operating Procedures (SOPs) and use cases for monitoring and handling different types of security eventsThreat intelligence gathering to ensure that detection methods are effective against current threatsHunt for suspicious activity based on anomalous activity.Handling events as part of the Security Incident Management ProcessWork with both internal and external partners to investigate and advise on security incidents and anomaliesPrepare detailed reports, providing information on findings, status and progress of investigations, as well as vulnerability and risk factorsServe as the senior technical escalation point and mentor for colleagues.Produce incident response playbooks to drive a consistent approach to handling common incidents and improve operational processes.Analysing structured security log data through the creation of aggregated / correlated reports or visualisations.Identify and implement opportunities for innovative and continuous improvementLead on customer incident response investigations and containment of threats, advising on remediationParticipate in the Security Operations Centre on-call rotationSkills and Attributes for SuccessExcellent technical skills, knowledge and understanding of the Logicalis Managed Security Services portfolio, IT Applications, Networking and infrastructureDemonstrable ability to think beyond the immediate situation and use critical thinking, context and judgment in the analysis of complex data sets and events. Actions will vary but most often will require development of a course of action or response to identified threatsAbility to work under pressure including crisis situations while maintaining a high degree of attention to detailExperience responding to customer requests including senior management and executivesAbility to quickly learn and adapt to new technologies and processes in a rapidly changing environmentExcellent written and oral communication skillsSelf-motivated to improve knowledge and skillsPeople orientatedGoal and outcome focusedClear communicatorPositive "can-do" attitudeAn example of integrityA mind-set of continual service improvementExcellent inter-personal skillsQualifications & ExperienceMust meet or be eligible to obtain U.S. Government Security ClearanceTypically 5+ years experience in IT Security including security operations and being a Sr/lead analyst in a SOC/MSSP or mature internal teamAnalysing & reviewing security logs from a range of sources, including SIEM - ideally Microsoft Sentinel, Splunk (Arcsight/Qradar/Logrhythm etc), IPS/IDS, Endpoint Security (e.g. Carbon Black); Windows EventlogThreat Intelligence - in the context of using it in a Security Operations environmentSecuring services migrated to cloud platform (AWS/AZURE etc) preferredIndustry recognised certifications such as: SANS GIAC GCIA, GCIH, GCFA, GNFA, GCTI, GREM or CEH, CISSP etcA related professional certification, for example; CISSP, CISM, CISASolid IT and/or technology backgroundAwareness of industry standards - PCI-DSS, ISO 27001, GPG 13 etc. etc.Awareness of common exploits and vulnerabilitiesSolid network engineering and server architecture awarenessPrevious hands on experience in network/server and security operational rolesSalary Compensation Range: $90,300 to $121,900Apply here: https://www.aplitrak.com/?adid=YmJnZW5lcmljLjE4NjM2LjEzMjUzQHVzbG9naWNhbGlzY29tcC5hcGxpdHJhay5jb20