Senior Analyst – CVS Remote Jobs
Job Description
Job Type: Senior Analyst from home
Location: Georgia work from home
Company: CVS Health
As a Security Operations Center (SOC) Senior Analyst you will be responsible for the identification and tracking of potential security incidents across the CVS Health enterprise. The SOC Senior Analyst is essential, as you are part of the first line of defense for CVS Health s Information Security. The SOC Senior Analyst position is responsible for training new SOC analysts, assisting in intricate cyber security investigations as part of Threat Response activities; facilitating escalation of cyber security Incidents according to a well-documented Incident Response plan; creating, maintaining & updating SOP documentation for SOC Threat Response playbooks; metrics reporting; and ensuring correct analysis for the cyber security alerts the SOC responds to.
Responsibilities:
- Performing inbound security event analysis in an industry-leading SIEM in a shift environment and supporting Level 1 analysts engaged in the same task.
- Review ongoing or completed investigations performed by Level 1 SOC Analysts for potential escalation and/or provide analysis feedback to Analyst and SOC Managers
- Reviewing alerts in an industry-leading SOAR platform and creating cases in the case management environment
- Performing review and validation of daily compliance reports to track business as usual and out-of-policy activities.
- Working alongside senior security engineers and architects to deliver superior security services to CVS Health business units.
Pay Range
The typical pay range for this role is:
- Minimum: 70,000
- Maximum: 140,000
Please keep in mind that this range represents the pay range for all positions in the job grade within which this position falls. The actual salary offer will take into account a wide range of factors, including location.
Requirements:
- 3–5+ years of experience and knowledge of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP, HTTPS, VPN, etc.).
- 3 to 5 years of experience or more and a strong understanding of how operating systems work (Windows, UNIX, Linux, MacOS)
- 3–5+ years of experience with cyber security and information security concepts (Phishing, Malware, Vulnerabilities, DDoS)
- 3–5+ years of experience with Microsoft Technologies like Active Directory, DNS, and DHCP
- 3–5+ years of experience using different ideas and technologies for identity and access management and authentication
- Ability to collect data from different systems so that correlations can be made and data analysis can be done.
Skill In:
- Written communication that is clear and to the point
- Organizational multitasking and following up
Ability To:
- Do accurate investigation analysis for cyber security and write it down. Response to threats in a fast-paced environment with priorities that change quickly
- Take the lead on analysis of investigations and research on incidents
- In a shift-based setting, keep regular and predictable attendance.
- Do any other SOC tasks that the manager or director tells you to.
What you know:
Working experience and knowledge of at least two of the following security technologies: Intrusion Prevention systems, Web Proxies, SIEM, SOAR, EDR, Firewalls, Web Application Scanner, Vulnerability Scanners, Malware Research Tools, or Forensic Tools.
Skill in: Talks and presentations in public
Ability To:
- Give your opinion on the direction of policy and best practices.
- Give your coworkers feedback that will help them improve.
- Provide proof of or get one or more certifications, such as Network+, Security+, CySA+, CCSP, CCSK, GCIH, GCIA, GCFE, GREM, GCFA, GSEC, CEH, CISSP, AWS, Microsoft Azure Security Engineer or equivalent
Education: You need a Bachelor’s degree or the equivalent in work experience plus a High School Diploma or GED.