Apply for this Job
Hello, My name is Anubhav and I'm a recruiter at Artech. We are constantly on the lookout for professionals to fulfil the staffing needs of our clients, and we currently have a job opening that may interest you. Please find below, summary of the position. If you are currently not in the job seeking market, feel free to refer this position to someone you may know to be a fit. However, should this position be of interest to you, please send me your resume or contact me directly at . Below are the position details for your reference: Job Title: CSOC Analyst II Location: Remote Duration: 06 months +(Possible Extension) Job Description: Summary: Key Responsibilities:
• Identification of Cybersecurity problems which may require mitigating controls
• Analyze network traffic to identify exploit or intrusion related attempts
• Recommend detection mechanisms for exploit and or intrusion related attempts
• Provide subject matter expertise on network based attacks, network traffic analysis, and intrusion methodologies
• Escalate items which require further investigation to other members of the Threat Management team
• Execute operational processes in support of response efforts to identified security incidents
• Responsible for monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC). Duties include performing threat detection and analysis, investigating suspicious activity, coordinating incident response efforts, and implementing remediation actions. The role also involves tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization's security posture Job responsibilities will include:
• Participates in a team of Security operations engineers investigating alerts, anomalies, errors, intrusions, malware, etc. to identify the responsible, determine remediation, and recommend security improvements
• Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, etc
• Follows strict guidance on reporting requirements
• Keeps management informed with precise, unvarnished information about security posture and events
• Promotes standards-based workflow both internally and in coordinating with CISA
• Engages with other internal and external parties to get and share information to improve processes and security posture
• Guide team efforts
• Communicates to CISO leadership
• Leads analyzing/investigating reports or anomalies Requirements:
• Must be eligible to obtain a sensitive clearance - Position of Public Trust - and may be required to obtain a higher security clearance
• Preferred 3+ years IT security experience
• Preferred 2+ years' experience in network traffic analysis
• Strong working knowledge of:
• TCP/IP Fundamentals
• Network Level Exploits
• Excellent oral and written communication skills
• Excellent interpersonal and organizational skills
• Strong understanding of IDS/IPS technologies, trends, vendors, processes and methodologies
• Strong understanding of common IDS/IPS architectures and implementations
• Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly-based analysis and detection
• Azure and GCP O365/Microsoft 365 experience required Desired Skills:
• Splunk experience, developing queries
• Cloud monitoring experience
• Excellent writing skills Required Education:
• Bachelor's OR Master's Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience. Certifications (one or more desired):
• Comp TIA Security+, CISSP, CISA, CISM, GIAC, RHCE. Regards, Anubhav Tiwari Associate Recruiter CORE Cell: +1- Email: 360 Mt. Kemble Avenue, Suite 2000 Morristown, NJ 07960 Website:
Date Posted: 06 June 2025
Apply for this Job