Service Delivery Manager

Summary:

An L2 SOC Analyst in a 5G SOC will perform in-depth analysis and response to security incidents, ensuring the continued integrity and security of 5G networks.


Principal Functions and Key Responsibilities:

As a Level 2 SOC Security Analyst, also known as an L2 SOC Analyst, you will be responsible for:

  • Conducting detailed analysis of security incidents escalated by L1 analysts.
  • Performing root cause analysis and advanced investigations to determine the extent of the threat.
  • Responding to and contain security incidents, minimizing their impact on network operations.
  • Using advanced security tools and techniques to analyze and mitigate threats.
  • Collaborating with other teams to implement security improvements and preventative measures.
  • Documenting and report on incident findings and actions taken.
  • Recommendations on incident response playbooks and procedures specific to 5G networks.
  • Providing training and guidance to L1 SOC analysts.
  • Keeping up to date with the latest threats, vulnerabilities, and technologies in the 5G space.
  • Maintaining 5G SOC operations lab.
  • Ensuring the continued integrity and security of 5G networks.


Qualifications:

  • Bachelor’s degree in computer science, Information Security, or a related field.
  • Strong Understanding of TCP/IP protocol and OSI Seven Layers Model and various types of Networks.
  • Strong understanding of cybersecurity and 5G technology.
  • Experience with a range of security tools, including SIEM, SOAR, Intrusion detection/prevention systems (IDS/IPS), and forensic tools.
  • Advanced analytical and problem-solving skills.
  • Ability to conduct detailed advanced investigations and malware analysis.
  • Strong communication and documentation skills.
  • Ability to work under pressure and respond to incidents promptly.
  • Industry certifications such as CCSP, CISSP, or similar are preferred.
  • Experience in 4G/5G Security Operations.
  • Experience working in ISP’s on 4G/5G technologies is a plus.
  • Experience working on Splunk and MS Sentinel.
  • Experience in IT and OT environments.


Certifications: CompTIA Security+, CSA (Certified SOC Analyst), CyberSecurity Analyst (CySA+), GIAC Certified Incident Handler (GCIH), Blue Team Level 1 (BTL1), MITRE Attack Defender (MAD) , MS Sentinel and Splunk Certifications (Preferred).


Experience: 5-7 years

Post date: 16 September 2024
Publisher: LinkedIn
Post date: 16 September 2024
Publisher: LinkedIn